[{"id":"AcceptPowerpointDesignerPrivacy","uniqueId":32,"displayName":"Accept PowerPoint Designer privacy","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Shown","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Preference to control whether the privacy dialog has been shown for PowerPoint Designer","supportedPlatforms":["Mac"],"tags":["Pane","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/SuggestionsPrivacyDialogLastShow","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"AllowVisualBasicToBindToSystem","uniqueId":33,"displayName":"Allow Use of system() from Visual Basic","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Preference to allow Visual Basic scripts to use system() from the system library","supportedPlatforms":["Mac"],"tags":["Word","PowerPoint","Excel"],"helpUrl":"https://docs.microsoft.com/office/vba/library-reference/concepts/security-notes-for-microsoft-office-solution-developers","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"AllowVisualBasicToBindToSystem","cfPreferenceDomain":"com.microsoft.office"}}},{"id":"AlternateRuntimeLocaleIdentifierInExcel","uniqueId":34,"displayName":"East Asian Language selection for Excel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"en_US","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English","description":"","tags":[],"dependencyGroup":null},{"value":"ja_JP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Japanese","description":"","tags":[],"dependencyGroup":null},{"value":"zh_CN","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Simplified Chinese","description":"","tags":[],"dependencyGroup":null},{"value":"zh_TW","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Traditional Chinese","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"en_US","description":"Preference to control the preferred language for East Asian editing features in Excel","supportedPlatforms":["Mac"],"tags":["Excel"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"string","cfPreferenceKey":"AlternateRuntimeLocaleIdentifier","cfPreferenceDomain":"com.microsoft.Excel"}}},{"id":"AlternateRuntimeLocaleIdentifierInPPT","uniqueId":35,"displayName":"East Asian Language selection for PowerPoint","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"en_US","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English","description":"","tags":[],"dependencyGroup":null},{"value":"ja_JP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Japanese","description":"","tags":[],"dependencyGroup":null},{"value":"zh_CN","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Simplified Chinese","description":"","tags":[],"dependencyGroup":null},{"value":"zh_TW","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Traditional Chinese","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"en_US","description":"Preference to control the preferred language for East Asian editing features in PowerPoint","supportedPlatforms":["Mac"],"tags":["PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"string","cfPreferenceKey":"AlternateRuntimeLocaleIdentifier","cfPreferenceDomain":"com.microsoft.Powerpoint"}}},{"id":"AlternateRuntimeLocaleIdentifierInWord","uniqueId":36,"displayName":"East Asian Language selection for Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"en_US","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English","description":"","tags":[],"dependencyGroup":null},{"value":"ja_JP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Japanese","description":"","tags":[],"dependencyGroup":null},{"value":"zh_CN","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Simplified Chinese","description":"","tags":[],"dependencyGroup":null},{"value":"zh_TW","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Traditional Chinese","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"en_US","description":"Preference to control the preferred language for East Asian editing features in Word","supportedPlatforms":["Mac"],"tags":["Word"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"string","cfPreferenceKey":"AlternateRuntimeLocaleIdentifier","cfPreferenceDomain":"com.microsoft.Word"}}},{"id":"AlwaysStartPresenterViewWith2Displays","uniqueId":37,"displayName":"Always start Presenter View with 2 displays","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control if PowerPoint starts slide show mode with two displays","supportedPlatforms":["Mac"],"tags":["Slide Show","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/Show Use Presenter Tools","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"AlwaysSuggestCorrections","uniqueId":38,"displayName":"Always suggest corrections","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control if PowerPoint will suggest spelling corrections","supportedPlatforms":["Mac"],"tags":["Spelling","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/Suggest Always","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"AlwaysUseTheseSettings","uniqueId":39,"displayName":"Always use these settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":false,"description":"Preference to control if the given user name and initials should always be used regardless of logon","supportedPlatforms":["Mac"],"tags":["User Information","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/Common/UserInfo/UseLocal","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"AutofitBodyTextToPlaceholder","uniqueId":40,"displayName":"Autofit body text to placeholder","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control if PowerPoint automatically fits body text","supportedPlatforms":["Mac"],"tags":["AutoFormat","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/AutoFit","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"AutofitTitleTextToPlaceholder","uniqueId":41,"displayName":"Autofit title text to placeholder","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control if PowerPoint automatically fits title text","supportedPlatforms":["Mac"],"tags":["AutoFormat","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/AutoFormat Autofit Title","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"AutomaticallyDownloadExternalContent","uniqueId":42,"displayName":"Download embedded images","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Never","description":"Never automatically download embedded images","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"In messages from my contacts","description":"Automatically download embedded images only for messages from my contacts","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"In all messages","description":"Automatically download embedded images for all messages","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Preference to control downloading of embedded images in the reading panel","supportedPlatforms":["Mac"],"tags":["Outlook"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"AutomaticallyDownloadExternalContent","cfPreferenceDomain":"com.microsoft.Outlook"}}},{"id":"AutomaticallySelectEntireWordWhileSelectingText","uniqueId":43,"displayName":"Automatically select entire word while selecting text","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control whether PowerPoint automatically selects entire words","supportedPlatforms":["Mac"],"tags":["PowerPoint","Edit"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/WordSelection","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"AutomaticallyShowMeDesignIdeas","uniqueId":44,"displayName":"Automatically show me design ideas","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control whether PowerPoint Designer automatically shows design ideas","supportedPlatforms":["Mac"],"tags":["General","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/EnableSuggestionAutoPrompt","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"AutomaticBulletedAndNumberedLists","uniqueId":45,"displayName":"Automatic bulleted and numbered lists","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control if PowerPoint automatically formats lists","supportedPlatforms":["Mac"],"tags":["AutoFormat","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/AutoFormat Bullets","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"CapitalizeFirstLetterOfSentences","uniqueId":46,"displayName":"Capitalize first letter of sentences","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control whether PowerPoint automatically capitalizes the first letter of sentences","supportedPlatforms":["Mac"],"tags":["AutoCorrect","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/Common/AutoCorrect/CapitalizeSentence","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"CapitalizeNamesOfDays","uniqueId":47,"displayName":"Capitalize names of days","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control whether PowerPoint automatically capitalizes the names of days","supportedPlatforms":["Mac"],"tags":["AutoCorrect","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/Common/AutoCorrect/CapitalizeNamesOfDays","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"CheckSpellingAsYouType","uniqueId":48,"displayName":"Check spelling as you type","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control if PowerPoint will spell-check in the background","supportedPlatforms":["Mac"],"tags":["Spelling","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/Background spell checking","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"CorrectTwoInitialCapitals","uniqueId":49,"displayName":"Correct TWo INitial CApitals","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control whether PowerPoint automatically corrects words that have two capital letters","supportedPlatforms":["Mac"],"tags":["AutoCorrect","PowerPoint"],"helpUrl":"https://macadmins.software","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/Common/AutoCorrect/CorrectTwoInitialCapitals","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"CustomActionsSecurity","uniqueId":50,"displayName":"Custom Actions Security","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not allow actions to run programs","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow actions to run programs with notification","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow actions to run programs without notification (not recommended)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control whether PowerPoint can perform custom actions","supportedPlatforms":["Mac"],"tags":["Privacy","PowerPoint","Security"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Security/RunPrograms","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"CustomerLoggingEnabled","uniqueId":51,"displayName":"Enable application diagnostic logging","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Enables IT admins to collect more diagnostic information about applications","supportedPlatforms":["Mac"],"tags":["Word","OneNote","PowerPoint","Excel","Outlook"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"CustomerLoggingEnabled","cfPreferenceDomain":"com.microsoft.common"}}},{"id":"DefaultsToLocalOpenSave","uniqueId":52,"displayName":"Show local folder locations by default","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Controls whether the file I/O dialog shows Online or 'On my Mac' locations, by default","supportedPlatforms":["Mac"],"tags":["Excel","Word","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"DefaultsToLocalOpenSave","cfPreferenceDomain":"com.microsoft.office"}}},{"id":"DefaultViewForNewPresentations","uniqueId":53,"displayName":"Default view for new presentations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Normal View","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Slide View","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Outline View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control PowerPoint's default view","supportedPlatforms":["Mac"],"tags":["PowerPoint","View"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/DefaultView","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"DefaultWeatherLocation","uniqueId":54,"displayName":"Default weather location","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^.{1,64}$","validationFailErrorText":""},"dataType":"String"},"defaultValue":false,"description":"Preference to set the default weather location in the Calendar view. The value is a string with the city and state or country/region (e.g. Redmond, WA or Paris, France).","supportedPlatforms":["Mac"],"tags":["Outlook"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"DefaultWeatherLocation","cfPreferenceDomain":"com.microsoft.Outlook"}}},{"id":"DesiredPrintQuality","uniqueId":55,"displayName":"Desired Print Quality","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"High","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Medium","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Low","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Preference to control output Print and PDF quality","supportedPlatforms":["Mac"],"tags":["General","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/PDF quality settings","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"DisableCloudFonts","uniqueId":56,"displayName":"Disable Cloud Fonts","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Preference to disable use of fonts downloaded from a web service","supportedPlatforms":["Mac"],"tags":["Word","PowerPoint","Outlook","OneNote","Excel"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"DisableCloudFonts","cfPreferenceDomain":"com.microsoft.office"}}},{"id":"DisableExport","uniqueId":57,"displayName":"Disable export to OLM files","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Preference to disallow export of mail to OLM files","supportedPlatforms":["Mac"],"tags":["Outlook"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"DisableExport","cfPreferenceDomain":"com.microsoft.Outlook"}}},{"id":"DisableImport","uniqueId":58,"displayName":"Disable import from OLM and PST files","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Preference to disallow import of PST files, Identities, and OLM files","supportedPlatforms":["Mac"],"tags":["Outlook"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"DisableImport","cfPreferenceDomain":"com.microsoft.Outlook"}}},{"id":"DisableSkypeMeeting","uniqueId":59,"displayName":"Disable Skype for Business meeting support","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Preference to disable support for Skype for Business meetings","supportedPlatforms":["Mac"],"tags":["Outlook"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"DisableSkypeMeeting","cfPreferenceDomain":"com.microsoft.Outlook"}}},{"id":"DisableTeamsMeeting","uniqueId":60,"displayName":"Disable Microsoft Teams meeting support","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Preference to disable support for Microsoft Teams meetings","supportedPlatforms":["Mac"],"tags":["Outlook"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"DisableTeamsMeeting","cfPreferenceDomain":"com.microsoft.Outlook"}}},{"id":"DisableVisualBasicExternalDylibs","uniqueId":61,"displayName":"Disable Loading of External Dylibs from Visual Basic","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Preference to disable Visual Basic from loading external dynamic libraries","supportedPlatforms":["Mac"],"tags":["Word","PowerPoint","Excel"],"helpUrl":"https://docs.microsoft.com/office/vba/library-reference/concepts/security-notes-for-microsoft-office-solution-developers","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"DisableVisualBasicExternalDylibs","cfPreferenceDomain":"com.microsoft.office"}}},{"id":"DisableVisualBasicMacScript","uniqueId":62,"displayName":"Disable running AppleScripts from Visual Basic","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Preference to disable Visual Basic from running AppleScripts","supportedPlatforms":["Mac"],"tags":["Word","PowerPoint","Excel"],"helpUrl":"https://docs.microsoft.com/office/vba/library-reference/concepts/security-notes-for-microsoft-office-solution-developers","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"DisableVisualBasicMacScript","cfPreferenceDomain":"com.microsoft.office"}}},{"id":"DisableVisualBasicToBindToPopen","uniqueId":63,"displayName":"Disable Use of popen() from Visual Basic","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Preference to disable the ability of Visual Basic scripts from using popen() from the system library","supportedPlatforms":["Mac"],"tags":["Word","PowerPoint","Excel"],"helpUrl":"https://docs.microsoft.com/office/vba/library-reference/concepts/security-notes-for-microsoft-office-solution-developers","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"DisableVisualBasicToBindToPopen","cfPreferenceDomain":"com.microsoft.office"}}},{"id":"DocsUICustomUserTemplatesLocationKey","uniqueId":64,"displayName":"Custom folder location for storing user templates","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"defaultValue":"nil","description":"Custom folder location for storing user templates. Need to investigate string format","supportedPlatforms":["Mac"],"tags":["Excel","Word","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"string","cfPreferenceKey":"DocsUICustomUserTemplatesLocationKey","cfPreferenceDomain":"com.microsoft.office"}}},{"id":"DocsUICustomWorkgroupTemplatesLocationKey","uniqueId":65,"displayName":"Custom folder location for storing workgroup templates","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"defaultValue":"nil","description":"Custom folder location for storing workgroup templates","supportedPlatforms":["Mac"],"tags":["Excel","Word","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"string","cfPreferenceKey":"DocsUICustomWorkgroupTemplatesLocationKey","cfPreferenceDomain":"com.microsoft.office"}}},{"id":"Drag-and-dropTextEditing","uniqueId":66,"displayName":"Drag-and-drop text editing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control whether PowerPoint supports drag-and-drop text editing","supportedPlatforms":["Mac"],"tags":["PowerPoint","Edit"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/DragAndDrop","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"DynamicGuidesVisible","uniqueId":67,"displayName":"Dynamic guides visible","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control whether the horizontal and vertical dynamic guides are present in the canvas","supportedPlatforms":["Mac"],"tags":["Ribbon","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/DynamicGuidesVisible","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"EnablePowerpointDesigner","uniqueId":68,"displayName":"Enable PowerPoint Designer","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":73187,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":73187,"description":"Preference to control whether PowerPoint Designer is enabled or not","supportedPlatforms":["Mac"],"tags":["General","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/EnableSuggestionServiceUserSetting","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"EndWithBlackSlide","uniqueId":69,"displayName":"End with black slide","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control if PowerPoint ends slide show with a blank slide","supportedPlatforms":["Mac"],"tags":["Slide Show","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/SSEndOnBlankSlide","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"FrenchModes","uniqueId":70,"displayName":"French modes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Traditional and new spellings","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Traditional spelling","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"New spelling","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Preference to control French mode spelling rules in PowerPoint","supportedPlatforms":["Mac"],"tags":["Spelling","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/French Modes","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"GuidesVisible","uniqueId":71,"displayName":"Guides visible","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Preference to control whether the horizontal and vertical guides are present in the canvas","supportedPlatforms":["Mac"],"tags":["Ribbon","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/GuidesVisible","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"HideFoldersOnMyComputerRootInFolderList","uniqueId":72,"displayName":"Hide On My Computer folders","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Preference to show or hide folders on my computer in the folder list","supportedPlatforms":["Mac"],"tags":["Outlook"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"HideFoldersOnMyComputerRootInFolderList","cfPreferenceDomain":"com.microsoft.Outlook"}}},{"id":"HideSpellingErrors","uniqueId":73,"displayName":"Hide spelling errors","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control whether PowerPoint shows spelling errors","supportedPlatforms":["Mac"],"tags":["Spelling","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Shared Tools/Proofing Tools/1.0/Office/PowerPointSpellingOptions","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"IgnoreWordsInUppercase","uniqueId":74,"displayName":"Ignore words in UPPERCASE","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control if PowerPoint will ignore uppercase words","supportedPlatforms":["Mac"],"tags":["Spelling","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/Ignore UPPERCASE words","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"IgnoreWordsWithNumbers","uniqueId":75,"displayName":"Ignore words with numbers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control if PowerPoint will ignore words that contain numbers","supportedPlatforms":["Mac"],"tags":["Spelling","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/Ignore words with numbers","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"InternetAndNetworkPathsWithHyperlinks","uniqueId":76,"displayName":"Internet and network paths with hyperlinks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control if PowerPoint automatically formats hyperlinks","supportedPlatforms":["Mac"],"tags":["AutoFormat","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/AutoCorrect Hyperlinks","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"IsAttachFilesEnabled","uniqueId":77,"displayName":"Enable sending documents dialog on crash","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":true,"description":"Enables IT admins to control whether users are allowed to send document data in the event of a crash","supportedPlatforms":["Mac"],"tags":[],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"IsAttachFilesEnabled","cfPreferenceDomain":"com.microsoft.errorreporting"}}},{"id":"IsStoreLastCrashEnabled","uniqueId":78,"displayName":"Store last crash log on disk","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Enables IT admins to enable logging of crashes to disk - $HOME/Library/Group Containers/UBF8T346G9.ms/MerpTempItems/LastSentCrashReport.zip","supportedPlatforms":["Mac"],"tags":[],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"IsStoreLastCrashEnabled","cfPreferenceDomain":"com.microsoft.errorreporting"}}},{"id":"kCUIThemePreferencesThemeKeyPath","uniqueId":79,"displayName":"Office theme","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Classic","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the suite-wide color theme for Microsoft Office applications","supportedPlatforms":["Mac"],"tags":["Word","OneNote","PowerPoint","Excel","Outlook"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"integer","cfPreferenceKey":"kCUIThemePreferencesThemeKeyPath","cfPreferenceDomain":"com.microsoft.office"}}},{"id":"kSubUIAppCompletedFirstRunSetup1507Excel","uniqueId":80,"displayName":"Is first run setup complete in Excel","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Enables IT admins to control whether users go through the first run experience in Excel","supportedPlatforms":["Mac"],"tags":["Excel"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"kSubUIAppCompletedFirstRunSetup1507","cfPreferenceDomain":"com.microsoft.Excel"}}},{"id":"kSubUIAppCompletedFirstRunSetup1507OneNote","uniqueId":81,"displayName":"Is first run setup complete in OneNote","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Enables IT admins to control whether users go through the first run experience in OneNote","supportedPlatforms":["Mac"],"tags":["OneNote"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"kSubUIAppCompletedFirstRunSetup1507","cfPreferenceDomain":"com.microsoft.OneNote"}}},{"id":"kSubUIAppCompletedFirstRunSetup1507Outlook","uniqueId":82,"displayName":"Is first run setup complete in Outlook","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Enables IT admins to control whether users go through the first run experience in Outlook","supportedPlatforms":["Mac"],"tags":["Outlook"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"kSubUIAppCompletedFirstRunSetup1507","cfPreferenceDomain":"com.microsoft.Outlook"}}},{"id":"kSubUIAppCompletedFirstRunSetup1507PowerPoint","uniqueId":83,"displayName":"Is first run setup complete in PowerPoint","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Enables IT admins to control whether users go through the first run experience in PowerPoint","supportedPlatforms":["Mac"],"tags":["PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"kSubUIAppCompletedFirstRunSetup1507","cfPreferenceDomain":"com.microsoft.Powerpoint"}}},{"id":"kSubUIAppCompletedFirstRunSetup1507Word","uniqueId":84,"displayName":"Is first run setup complete in Word","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Enables IT admins to control whether users go through the first run experience in Word","supportedPlatforms":["Mac"],"tags":["Word"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"kSubUIAppCompletedFirstRunSetup1507","cfPreferenceDomain":"com.microsoft.Word"}}},{"id":"MaximumNumberOfUndos","uniqueId":85,"displayName":"Maximum number of undos","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Integer"},"defaultValue":20,"description":"Preference to control how many undo operations PowerPoint will rememeber","supportedPlatforms":["Mac"],"tags":["PowerPoint","Edit"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/Number of Undos","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"OfficeActivationEmailAddress","uniqueId":86,"displayName":"Email address of the Office 365 user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"defaultValue":"nil","description":"Controls the 'Belongs To' value in the app About box, and the account pre-fill value for Outlook account set up","supportedPlatforms":["Mac"],"tags":["Word","OneNote","PowerPoint","Excel","Outlook"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"string","cfPreferenceKey":"OfficeActivationEmailAddress","cfPreferenceDomain":"com.microsoft.office"}}},{"id":"OUIRibbonShowGroupTitles","uniqueId":87,"displayName":"Show group titles","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Preference to control whether group titles are shown in the ribbon (under icons)","supportedPlatforms":["Mac"],"tags":["PowerPoint","View"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"OUIRibbonShowGroupTitles","cfPreferenceDomain":"com.microsoft.Powerpoint"}}},{"id":"PII-Preference","uniqueId":88,"displayName":"Send personal information to Microsoft to make improvements to Office","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Preference to control whether personally identifiable information is sent to Microsoft","supportedPlatforms":["Mac"],"tags":["Privacy","PowerPoint","Security"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"PII_Preference","cfPreferenceDomain":"com.microsoft.Powerpoint"}}},{"id":"PolicyEnableONetConfigOverrides","uniqueId":89,"displayName":"Enable URL overrides","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Allows URL overrides for the Office client configuration","supportedPlatforms":["Mac"],"tags":["Word","OneNote","PowerPoint","Excel","Outlook"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"integer","cfPreferenceKey":"PolicyEnableONetConfigOverrides","cfPreferenceDomain":"com.microsoft.office"}}},{"id":"PromptForDocumentProperties","uniqueId":90,"displayName":"Prompt for document properties","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Preference to control if PowerPoint prompts the user to enter document properties when saving","supportedPlatforms":["Mac"],"tags":["PowerPoint","Save"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/PromptForFileProperties","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"ProvideFeedbackWithSound","uniqueId":91,"displayName":"Provide feedback with sound","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Preference to control whether the user hears sound when an error occurs","supportedPlatforms":["Mac"],"tags":["General","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/Common/General/Sound","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"ReplaceTextAsYouType","uniqueId":92,"displayName":"Replace text as you type","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control whether PowerPoint automatically corrects spelling errors in the background","supportedPlatforms":["Mac"],"tags":["AutoCorrect","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/Common/AutoCorrect/ReplaceText","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"RulerVisible","uniqueId":93,"displayName":"Ruler visible","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Preference to control whether the horizontal and vertical rulers are present in the canvas","supportedPlatforms":["Mac"],"tags":["Ribbon","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/RulersVisible","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"SaveAutorecoverInfo","uniqueId":94,"displayName":"Save AutoRecover info","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control if PowerPoint prompts saves auto-recovery information","supportedPlatforms":["Mac"],"tags":["PowerPoint","Save"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/SaveAutoRecoveryInfo","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"SaveEveryNnMinutes","uniqueId":95,"displayName":"Save every nn minutes","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Integer"},"defaultValue":10,"description":"Preference to control how often PowerPoint saves files for auto-recovery","supportedPlatforms":["Mac"],"tags":["PowerPoint","Save"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/FrequencyToSaveAutoRecoverInfo","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"SavePreviewPictureWithThisDocument","uniqueId":96,"displayName":"Save preview picture with this document","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control whether a preview is saved by default","supportedPlatforms":["Mac"],"tags":["PowerPoint","Properties"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/SavePreview","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"SendAllTelemetryEnabled","uniqueId":97,"displayName":"Send application usage data to Microsoft","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":true,"description":"Enables IT admins to control whether application usage data is sent back to Microsoft","supportedPlatforms":["Mac"],"tags":["Word","OneNote","PowerPoint","Excel","Outlook"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"SendAllTelemetryEnabled","cfPreferenceDomain":"com.microsoft.common"}}},{"id":"SendASmileEnabledInExcel","uniqueId":98,"displayName":"Allow users to provide in-app feedback in Excel","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":true,"description":"Enables IT admins to control whether in-app feedback (smile face) and surveys are enabled in Excel","supportedPlatforms":["Mac"],"tags":["Excel"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"SendASmileEnabled","cfPreferenceDomain":"com.microsoft.Excel"}}},{"id":"SendASmileEnabledInOneNote","uniqueId":99,"displayName":"Allow users to provide in-app feedback in OneNote","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":true,"description":"Enables IT admins to control whether in-app feedback (smile face) and surveys are enabled in OneNote","supportedPlatforms":["Mac"],"tags":["OneNote"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"SendASmileEnabled","cfPreferenceDomain":"com.microsoft.OneNote"}}},{"id":"SendASmileEnabledInOutlook","uniqueId":100,"displayName":"Allow users to provide in-app feedback in Outlook","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":true,"description":"Enables IT admins to control whether in-app feedback (smile face) and surveys are enabled in Outlook","supportedPlatforms":["Mac"],"tags":["Outlook"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"SendASmileEnabled","cfPreferenceDomain":"com.microsoft.Outlook"}}},{"id":"SendASmileEnabledInPowerPoint","uniqueId":101,"displayName":"Allow users to provide in-app feedback in PowerPoint","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":true,"description":"Enables IT admins to control whether in-app feedback (smile face) and surveys are enabled in PowerPoint","supportedPlatforms":["Mac"],"tags":["PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"SendASmileEnabled","cfPreferenceDomain":"com.microsoft.Powerpoint"}}},{"id":"SendASmileEnabledInWord","uniqueId":102,"displayName":"Allow users to provide in-app feedback in Word","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":true,"description":"Enables IT admins to control whether in-app feedback (smile face) and surveys are enabled in Word","supportedPlatforms":["Mac"],"tags":["Word"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"SendASmileEnabled","cfPreferenceDomain":"com.microsoft.Word"}}},{"id":"SendCrashReportsEvenWithTelemetryDisabled","uniqueId":103,"displayName":"Send crash reports even when usage telemetry is disabled","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Enables IT admins to continue to send crash reports even if their preference is to disable usage telemetry","supportedPlatforms":["Mac"],"tags":[],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"SendCrashReportsEvenWithTelemetryDisabled","cfPreferenceDomain":"com.microsoft.errorreporting"}}},{"id":"SendCriticalTelemetryEnabled","uniqueId":104,"displayName":"Send application heartbeat data to Microsoft","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":true,"description":"Enables IT admins to control whether application heartbeat data is sent back to Microsoft","supportedPlatforms":["Mac"],"tags":["Word","OneNote","PowerPoint","Excel","Outlook"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"SendCriticalTelemetryEnabled","cfPreferenceDomain":"com.microsoft.common"}}},{"id":"ShowAdd-inUserInterfaceErrors","uniqueId":105,"displayName":"Show add-in user interface errors","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Preference to control whether users see error messages from add-ins","supportedPlatforms":["Mac"],"tags":["General","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/Common/General/ReportAddinCustomUIErrors","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"ShowAutocorrectSmartButton","uniqueId":106,"displayName":"Show AutoCorrect Smart Button","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control if PowerPoint displays the AutoCorrect smart button","supportedPlatforms":["Mac"],"tags":["AutoCorrect","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/Show AutoCorrect Options Buttons","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"ShowDocStageOnLaunch","uniqueId":107,"displayName":"Show the document template gallery on app launch","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":true,"description":"Allows the IT administrator to stop the document template gallery from being shown on app launch, instead, taking the user directly to the document canvas","supportedPlatforms":["Mac"],"tags":["Excel","Word","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"integer","cfPreferenceKey":"ShowDocStageOnLaunch","cfPreferenceDomain":"com.microsoft.office"}}},{"id":"ShowFileExtensions","uniqueId":108,"displayName":"Show file extensions in open and save dialogs","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Controls whether file extensions (e.g. docx, xlsx, pptx, etc) are shown during file I/O operations","supportedPlatforms":["Mac"],"tags":["Excel","Word","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"ShowFileExtensions","cfPreferenceDomain":"com.microsoft.office"}}},{"id":"ShowPresenceFlagsForSelectedItems","uniqueId":109,"displayName":"Show presence flags for selected items","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Preference to control whether indicators are shown for other users collaborating within the document","supportedPlatforms":["Mac"],"tags":["PowerPoint","View"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/Common/Office Graphics/AlwaysShowRemoteSelectionFlags","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"ShowVerticalRulers","uniqueId":110,"displayName":"Show vertical rulers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control whether PowerPoint shows a vertical ruler","supportedPlatforms":["Mac"],"tags":["PowerPoint","View"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/VerticalRuler","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"ShowWhatsNewOnLaunch","uniqueId":111,"displayName":"Show Whats New window on app launch","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":true,"description":"Allows the IT administrator to disable the Whats New window so that it is not presented to users after app updates","supportedPlatforms":["Mac"],"tags":["Word","PowerPoint","Excel","Outlook"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"integer","cfPreferenceKey":"ShowWhatsNewOnLaunch","cfPreferenceDomain":"com.microsoft.office"}}},{"id":"SlideShowNavigation","uniqueId":112,"displayName":"Slide Show navigation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Pop-up menu button","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No Slide Show controls","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Preference to control navigation method for slide shows","supportedPlatforms":["Mac"],"tags":["Slide Show","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/SS Control Option","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"StraightQuotesWithSmartQuotes","uniqueId":113,"displayName":"Straight quotes with smart quotes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control if PowerPoint automatically formats quotes","supportedPlatforms":["Mac"],"tags":["AutoFormat","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/SmartQuotes","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"SuppressO365AutodiscoverOverride","uniqueId":114,"displayName":"Use domain-based autodiscover instead of Office 365","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Preference to on whether to contact the endpoint for the mailbox domain instead of the Office 365 service.  When set to true, the endpoint for the mailbox domain will be used.","supportedPlatforms":["Mac"],"tags":["Outlook"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"SuppressO365AutodiscoverOverride","cfPreferenceDomain":"com.microsoft.Outlook"}}},{"id":"TrustAccessToTheVbaProjectObjectModel","uniqueId":115,"displayName":"Trust access to the VBA project object model","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Preference to control whether PowerPoint can trust the Visual Basic object model","supportedPlatforms":["Mac"],"tags":["Privacy","PowerPoint","Security"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Security/AccessVBOM","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"TrustO365AutodiscoverRedirect","uniqueId":116,"displayName":"Trust Office 365 autodiscover redirects","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Preference whether or not to Trust Office 365 autodiscover redirects","supportedPlatforms":["Mac"],"tags":["Outlook"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"TrustO365AutodiscoverRedirect","cfPreferenceDomain":"com.microsoft.Outlook"}}},{"id":"UseGermanPost-reformRules","uniqueId":117,"displayName":"Use German post-reform rules","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control if PowerPoint will use German post-reform spelling rules","supportedPlatforms":["Mac"],"tags":["Spelling","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/Use German reform spelling rules","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"UserInitials","uniqueId":118,"displayName":"User initials","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"defaultValue":"MOU","description":"Preference to control the user initials","supportedPlatforms":["Mac"],"tags":["User Information","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/Common/UserInfo/UserInitials","registrySubPath":"","registryType":"REG_SZ","registryHiveType":""}}},{"id":"UserName","uniqueId":119,"displayName":"User name","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"defaultValue":"Microsoft Office User","description":"Preference to control the user name","supportedPlatforms":["Mac"],"tags":["User Information","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/Common/UserInfo/UserInfo","registrySubPath":"","registryType":"REG_SZ","registryHiveType":""}}},{"id":"UseSmartCutAndPaste","uniqueId":120,"displayName":"Use smart cut and paste","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control whether PowerPoint uses enhanced paste options","supportedPlatforms":["Mac"],"tags":["PowerPoint","Edit"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/SmartCutPaste","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"VBAObjectModelIsTrusted","uniqueId":121,"displayName":"Trust the Visual Basic Object Model","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Preference to set the trustedness of the VBA project object model","supportedPlatforms":["Mac"],"tags":["Word","PowerPoint","Excel"],"helpUrl":"https://docs.microsoft.com/office/vba/library-reference/concepts/security-notes-for-microsoft-office-solution-developers","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"VBAObjectModelIsTrusted","cfPreferenceDomain":"com.microsoft.office"}}},{"id":"VisualBasicEntirelyDisabled","uniqueId":122,"displayName":"Visual Basic Entirely Disabled","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"defaultValue":false,"description":"Preference to completely disable Visual Basic","supportedPlatforms":["Mac"],"tags":["Word","PowerPoint","Excel"],"helpUrl":"https://docs.microsoft.com/office/vba/library-reference/concepts/security-notes-for-microsoft-office-solution-developers","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"boolean","cfPreferenceKey":"VisualBasicEntirelyDisabled","cfPreferenceDomain":"com.microsoft.office"}}},{"id":"VisualBasicMacroExecutionState","uniqueId":123,"displayName":"Ability to run Visual Basic macros in documents","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"DisabledWithoutWarnings","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled with no prompt to enable","description":"","tags":[],"dependencyGroup":null},{"value":"DisabledWithWarnings","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled with a prompt to enable","description":"","tags":[],"dependencyGroup":null},{"value":"EnabledWithoutWarnings","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled with no warning","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"DisabledWithWarnings","description":"Controls whether Visual Basic macros are allowed to run when opening documents","supportedPlatforms":["Mac"],"tags":["Excel","Word","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"cfPreference":{"platforms":["Mac"],"instructionType":"cfPreference","dataType":"string","cfPreferenceKey":"VisualBasicMacroExecutionState","cfPreferenceDomain":"com.microsoft.office"}}},{"id":"WarnBeforeOpeningAnApplicationOrMacro","uniqueId":124,"displayName":"Warn before opening an application or macro","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yes","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Preference to control if PowerPoint shows alerts in slide show mode","supportedPlatforms":["Mac"],"tags":["Slide Show","PowerPoint"],"helpUrl":"","firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac"],"instructionType":"orapiKey","registryKeyPath":"Software/Microsoft/Office/16.0/PowerPoint/Options/Show SlideShow Alerts","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":""}}},{"id":"access16;L_2007CompatibleCachePolicy","uniqueId":1180,"displayName":"Use Access 2007 compatible cache","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to force new and existing databases to use a cache compatible Access 2007.\n\nIf you enable this policy setting, new and existing databases will use caching compatible with Access 2007.\n\nIf you disable or do not configure this policy setting, new databases will default to use caching that is not compatible with Access 2007.  Existing databases will use the caching mode that they were created with.\n","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\settings","registrySubPath":"use2007compatiblecache","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_AllowTrustedLocationsOnTheNetwork","uniqueId":1050,"displayName":"Allow Trusted Locations on the network","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting controls whether trusted locations on the network can be used.\n      \nIf you enable this policy setting, users can specify trusted locations on network shares or in other remote locations that are not under their direct control by selecting the \"Allow Trusted Locations on my network (not recommended)\" check box in the Trusted Locations section of the Trust Center. Content, code, and add-ins are allowed to load from trusted locations with minimal security and without prompting the user for permission.\n\nIf you disable or do not configure this policy setting, the selected application ignores any network locations listed in the Trusted Locations section of the Trust Center. Disabling this policy setting does not delete any network locations from the Trusted Locations list. Instead, it forces the selected application to treat the locations as non-trusted and prevents users from adding new network locations to the list.\n\nIf you also deploy Trusted Locations via Group Policy, you should verify whether any of them are remote locations. If any of them are remote locations and you do not allow remote locations via this policy setting, those policy keys that point to remote locations will be ignored on client computers.\n\nDisabling this policy setting will cause disruption for users who add network locations to the Trusted Locations list. However, it is not recommended to enable this policy setting (as the \"Allow Trusted Locations on my network (not recommended)\" check box itself states), so in practice it should be possible to disable this policy setting in most situations without causing significant usability issues for most users.\n","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations","registrySubPath":"allownetworklocations","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_BlockAllUnmanagedAddins","uniqueId":1183,"displayName":"Block all unmanaged add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting blocks all add-ins that are not managed by the \"List of managed add-ins\" policy setting.\n\nIf you enable this policy setting, and the \"List of managed add-ins\" policy setting is also enabled, all add-ins are blocked except those that are configured as 1 (always enabled) or 2 (configurable by the user) in the \"List of managed add-ins\" policy setting.\n\nIf you disable or do not configure this policy setting, users can enable or disable any add-ins that are not managed by the \"List of managed add-ins\" policy setting.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\resiliency","registrySubPath":"restricttolist","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_BlockMacroExecutionFromInternet","uniqueId":1044,"displayName":"Block macros from running in Office files from the internet","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"\n        This policy setting allows you to block macros from running in Office files that come from the internet.\n\n        If you enable this policy setting, macros are blocked from running, even if \"Enable all macros\" is selected in the Macro Settings section of the Trust Center. Users will receive a notification that macros are blocked from running.\n\n        The exceptions when macros will be allowed to run are:\n        - The Office file is saved to a Trusted Location.\n        - The Office file was previously trusted by the user.\n        - Macros are digitally signed and the matching Trusted Publisher certificate is installed on the device.\n\n        If you disable this policy setting, the settings configured in the Macro Settings section of the Trust Center determine whether macros run in Office files that come from the internet.\n\n        If you don’t configure this policy setting, macros will be blocked from running. Users will receive a notification telling them of the security risks of macros from the internet along with a link to learn more.\n\n        For more information, see https://go.microsoft.com/fwlink/p/?linkid=2185771.\n      ","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security","registrySubPath":"blockcontentexecutionfrominternet","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_ClearCacheOnClosePolicy","uniqueId":1181,"displayName":"Clear cache on close","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to force the cache to be cleared for databases that are not compatible with Access 2016 when the database is closed.\n\nIf you enable this policy setting, then any cached Microsoft SharePoint or Business Data Catalog (BDC) links will be cleared on close for databases that do not use Access 2016 compatible caching.  If the database uses Access 2016 compatible caching, then this policy setting will have no effect when enabled.\n\nIf you disable or do not configure this policy setting, then any cached Microsoft SharePoint or Business Data Catalog (BDC) links will be not cleared on close for databases that do not use Access 2016 compatible caching.  If the database uses Access 2016 compatible caching, then this policy setting will have no effect when disabled or not configured.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\settings","registrySubPath":"clearcacheonclose","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_ConfigureCNGCipherChainingMode","uniqueId":1020,"displayName":"Configure CNG cipher chaining mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_ConfigureCNGCipherChainingMode;L_ConfigureCNGCipherChainingModeDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the cipher chaining mode used.\n\nIf you enable this policy setting, the cipher chaining mode specified will be applied.\n\nIf you disable or do not configure this policy setting, Cipher Block Chaining (CBC) will be the default CNG cipher chaining mode used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_ConfigureCNGCipherChainingMode;L_ConfigureCNGCipherChainingModeDropID","uniqueId":1019,"displayName":"Configure CNG cipher chaining mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"ChainingModeCBC","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cipher Block Chaining (CBC)","description":"","tags":[],"dependencyGroup":null},{"value":"ChainingModeCFB","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cipher Feedback (CFB)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"ChainingModeCBC","description":"This policy setting allows you to configure the cipher chaining mode used.\n\nIf you enable this policy setting, the cipher chaining mode specified will be applied.\n\nIf you disable or do not configure this policy setting, Cipher Block Chaining (CBC) will be the default CNG cipher chaining mode used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Application Settings","Microsoft Access 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\crypto","registrySubPath":"cipherchaining","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_Cursormovement","uniqueId":1005,"displayName":"Cursor movement","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_Cursormovement;L_cursormovement2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the default cursor movement mode.","supportedPlatforms":["Windows"],"tags":["International","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_Cursormovement;L_cursormovement2","uniqueId":1004,"displayName":"Cursor movement","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Logical","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Visual","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Specifies the default cursor movement mode.","supportedPlatforms":["Windows"],"tags":["International","Application Settings","Microsoft Access 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\settings","registrySubPath":"cursor","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_DefaultCustomTab","uniqueId":1188,"displayName":"Show custom templates tab by default in Access on the Office Start screen and in File | New","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether custom templates (when they exist) show as the default tab in Access on the Office Start screen and in File | New. \n\nIf you enable this policy setting, users will the see custom templates tab as the default tab in Access on the Office Start screen and in File | New when templates exist (this can include Custom XML programmed templates, templates in the Workgroup templates path, templates in the Personal templates path, or SharePoint templates).\n\nIf you disable or do not configure this policy setting, users will see the Featured templates tab as the default tab in Access on the Office Start screen and in File | New, unless all Office-provided templates have been disabled.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\settings","registrySubPath":"officestartdefaulttab","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_Defaultdatabasefolder","uniqueId":1016,"displayName":"Default database folder","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_Defaultdatabasefolder;L_defaultdatabasefolder6","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the default working folder.","supportedPlatforms":["Windows"],"tags":["General","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_Defaultdatabasefolder;L_defaultdatabasefolder6","uniqueId":1015,"displayName":"Default database folder","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specifies the default working folder.","supportedPlatforms":["Windows"],"tags":["General","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\settings","registrySubPath":"default database directory","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_Defaultdirection","uniqueId":1001,"displayName":"Default direction","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_Defaultdirection;L_defaultdirection0","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the default left-right text direction.","supportedPlatforms":["Windows"],"tags":["International","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_Defaultdirection;L_defaultdirection0","uniqueId":1000,"displayName":"Default direction","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Left-to-Right","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Right-to-left","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Specifies the default left-right text direction.","supportedPlatforms":["Windows"],"tags":["International","Application Settings","Microsoft Access 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\settings","registrySubPath":"new tables/queries/forms/reports","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_DefaultFileFormat","uniqueId":1178,"displayName":"Default file format","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_DefaultFileFormat;L_empty87","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls whether new database files are created in the new Access format or in a format used by earlier versions of Access.\n      \nIf you enable this policy setting, you can specify whether new database files are created in Access 2016 format by default or in Access 2002--2003 format. Users can still override the default and select a specific format when they save the files, but cannot set the default by themselves from the Access Options dialog. \n      \nIf you disable or do not configure this policy setting, when users create new database files, Access saves them in the new Access 2016 format; however, users can change this functionality by selecting a file format from the Default file format drop down list under Access Options | Popular | Creating databases. Note: If you disable this policy setting, users can choose from three default file formats: Access 2000, Access 2002--2003, and Access 2016. You can use this policy setting to specify either the Access 2002--2003 or Access 2016 format as the default, but not the Access 2000 format.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_DefaultFileFormat;L_empty87","uniqueId":1177,"displayName":"Default file format","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":12,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Access 2007","description":"","tags":[],"dependencyGroup":null},{"value":10,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Access 2002-2003","description":"","tags":[],"dependencyGroup":null},{"value":9,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Access 2000","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":12,"description":"This policy setting controls whether new database files are created in the new Access format or in a format used by earlier versions of Access.\n      \nIf you enable this policy setting, you can specify whether new database files are created in Access 2016 format by default or in Access 2002--2003 format. Users can still override the default and select a specific format when they save the files, but cannot set the default by themselves from the Access Options dialog. \n      \nIf you disable or do not configure this policy setting, when users create new database files, Access saves them in the new Access 2016 format; however, users can change this functionality by selecting a file format from the Default file format drop down list under Access Options | Popular | Creating databases. Note: If you disable this policy setting, users can choose from three default file formats: Access 2000, Access 2002--2003, and Access 2016. You can use this policy setting to specify either the Access 2002--2003 or Access 2016 format as the default, but not the Access 2000 format.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Access 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\settings","registrySubPath":"default file format","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_Disableallapplicationextensions","uniqueId":1046,"displayName":"Disable all application add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting disables all add-ins for the specified Office 2016 applications.\n\nIf you enable this policy setting, all add-ins for the specified Office 2016 applications are disabled.\n\nIf you disable or do not configure this policy setting, all add-ins for the specified Office 2016 applications are allowed to run without notifying the users.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security","registrySubPath":"disablealladdins","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_disablecommandbarbuttonsandmenuitems85","uniqueId":1174,"displayName":"Disable commands","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_disablecommandbarbuttonsandmenuitems85;L_EnteracommandbarIDtodisable","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable any command bar button and menu item with a command bar ID, including command bar buttons and menu items that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item. The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, all default command bar buttons or menu items are available to users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Access 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_disablecommandbarbuttonsandmenuitems85;L_EnteracommandbarIDtodisable","uniqueId":1173,"displayName":"Enter a command bar ID to disable","settingType":{"possibleValues":{"possibleValuesType":"List","ValueType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to disable any command bar button and menu item with a command bar ID, including command bar buttons and menu items that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item. The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, all default command bar buttons or menu items are available to users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Access 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\disabledcmdbaritemslist","registryPath":"TCID","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_Disablecommandbarbuttonsandmenuitems","uniqueId":1168,"displayName":"Disable predefined commands","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_Disablecommandbarbuttonsandmenuitems;L_FileSendToMailRecipient","logicalOperator":"exists","values":null},{"dependee":"access16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsSecuritySetDatabasePassword","logicalOperator":"exists","values":null},{"dependee":"access16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsSecurityUserandGroupPermissions","logicalOperator":"exists","values":null},{"dependee":"access16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsSecurityUserandGroupAccounts","logicalOperator":"exists","values":null},{"dependee":"access16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsSecurityUserLevelSecurityWizard","logicalOperator":"exists","values":null},{"dependee":"access16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsSecurityEncryptDecryptDatabase","logicalOperator":"exists","values":null},{"dependee":"access16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroVisualBasicEditorAcc","logicalOperator":"exists","values":null},{"dependee":"access16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroRunMacro","logicalOperator":"exists","values":null},{"dependee":"access16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroConvertMacrostoVisualBasic","logicalOperator":"exists","values":null},{"dependee":"access16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroCreateShortcutMenufromMacro","logicalOperator":"exists","values":null},{"dependee":"access16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsAddInsAcc","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n      \nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n      \nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\disabledcmdbaritemscheckboxes","registrySubPath":"fileopensearchtheweb","enforcedValues":{}}]}}},{"id":"access16;L_Disablecommandbarbuttonsandmenuitems;L_FileSendToMailRecipient","uniqueId":1157,"displayName":"File tab | Access Options | Customize | All Commands | Email","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"2188","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n      \nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n      \nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\disabledcmdbaritemscheckboxes","registrySubPath":"sendtomailrecipient","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsAddInsAcc","uniqueId":1167,"displayName":"Database Tools | Database Tools | Add-Ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"15719","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n      \nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n      \nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\disabledcmdbaritemscheckboxes","registrySubPath":"addinsmenuicon","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroConvertMacrostoVisualBasic","uniqueId":1165,"displayName":"Database Tools | Macro | Convert Macros to Visual Basic","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"2948","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n      \nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n      \nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacroconvertmacros","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroCreateShortcutMenufromMacro","uniqueId":1166,"displayName":"Database Tools | Macro | Create Shortcut Menu from Macro","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1570","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n      \nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n      \nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacrocreateshortcutmenu","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroRunMacro","uniqueId":1164,"displayName":"Database Tools | Macro | Run Macro","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"5745","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n      \nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n      \nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\disabledcmdbaritemscheckboxes","registrySubPath":"accrunmacro","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroVisualBasicEditorAcc","uniqueId":1163,"displayName":"Database tools | Macro | Visual Basic","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1695","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n      \nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n      \nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacrovbe","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsSecurityEncryptDecryptDatabase","uniqueId":1162,"displayName":"Database Tools | Database Tools | Encode/Decode Database","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"2074","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n      \nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n      \nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\disabledcmdbaritemscheckboxes","registrySubPath":"toolssecurityencrypt","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsSecuritySetDatabasePassword","uniqueId":1158,"displayName":"Database tools | Database tools | Encrypt with Password","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1814","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n      \nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n      \nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\disabledcmdbaritemscheckboxes","registrySubPath":"toolssecuritysetpwd","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsSecurityUserandGroupAccounts","uniqueId":1160,"displayName":"File tab | Access Options | Customize | All Commands | User and Group accounts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1816","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n      \nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n      \nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\disabledcmdbaritemscheckboxes","registrySubPath":"toolssecurityaccts","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsSecurityUserandGroupPermissions","uniqueId":1159,"displayName":"Database Tools | Administer | Users and Permission | User and Group Permissions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"572","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n      \nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n      \nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\disabledcmdbaritemscheckboxes","registrySubPath":"toolssecurityperms","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsSecurityUserLevelSecurityWizard","uniqueId":1161,"displayName":"File tab | Access Options | Customize | All Commands | User-Level Security Wizard...","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1815","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n      \nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n      \nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\disabledcmdbaritemscheckboxes","registrySubPath":"toolssecuritysecwiz","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_disableshortcutkeys86","uniqueId":1176,"displayName":"Disable shortcut keys","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_disableshortcutkeys86;L_Enterakeyandmodifiertodisable","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable any shortcut key by using its virtual key code ID, including shortcut keys that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter a virtual key code ID number to disable a specific shortcut key.\n\nIf you disable or do not configure this policy setting, all default shortcut keys are enabled for users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Access 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_disableshortcutkeys86;L_Enterakeyandmodifiertodisable","uniqueId":1175,"displayName":"Enter a key and modifier to disable","settingType":{"possibleValues":{"possibleValuesType":"List","ValueType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to disable any shortcut key by using its virtual key code ID, including shortcut keys that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter a virtual key code ID number to disable a specific shortcut key.\n\nIf you disable or do not configure this policy setting, all default shortcut keys are enabled for users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Access 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\disabledshortcutkeyslist","registryPath":"KeyMod","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_Disableshortcutkeys;L_AltF11ToolsMacroVisualBasicEditorAcc","uniqueId":1171,"displayName":"Alt+F11 (Database Tools | Macro | Visual Basic)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"122,16","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific shortcut key combinations in the specified applications. \n      \nIf you enable this policy setting you can disable specific shortcut keys for the selected application.  The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting. \n      \nIf you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\disabledshortcutkeyscheckboxes","registrySubPath":"toolsmacrovbe","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_Disableshortcutkeys;L_CtrlFFindAcc","uniqueId":1169,"displayName":"Ctrl+F (Home | Find | Find)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"70,8","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific shortcut key combinations in the specified applications. \n      \nIf you enable this policy setting you can disable specific shortcut keys for the selected application.  The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting. \n      \nIf you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\disabledshortcutkeyscheckboxes","registrySubPath":"find","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_Disableshortcutkeys;L_CtrlKInsertHyperlinkAcc","uniqueId":1170,"displayName":"Ctrl+K (File tab | Options | Customize | All Commands | Insert Hyperlinks)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"75,8","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific shortcut key combinations in the specified applications. \n      \nIf you enable this policy setting you can disable specific shortcut keys for the selected application.  The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting. \n      \nIf you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\disabledshortcutkeyscheckboxes","registrySubPath":"inserthyperlink","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_Disableshortcutkeys","uniqueId":1172,"displayName":"Disable shortcut keys","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_Disableshortcutkeys;L_CtrlFFindAcc","logicalOperator":"exists","values":null},{"dependee":"access16;L_Disableshortcutkeys;L_CtrlKInsertHyperlinkAcc","logicalOperator":"exists","values":null},{"dependee":"access16;L_Disableshortcutkeys;L_AltF11ToolsMacroVisualBasicEditorAcc","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable specific shortcut key combinations in the specified applications. \n      \nIf you enable this policy setting you can disable specific shortcut keys for the selected application.  The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting. \n      \nIf you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_DisableTrustBarNotificationforunsigned","uniqueId":1048,"displayName":"Disable Trust Bar Notification for unsigned application add-ins and block them","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable such add-ins without notification. This policy setting only applies if you enable the \"Require that application add-ins are signed by Trusted Publisher\" policy setting, which prevents users from changing this policy setting.\n\nIf you enable this policy setting, applications automatically disable unsigned add-ins without informing users.\n \nIf you disable this policy setting, if this application is configured to require that all add-ins be signed by a trusted publisher, any unsigned add-ins the application loads will be disabled and the application will display the Trust Bar at the top of the active window. The Trust Bar contains a message that informs users about the unsigned add-in.\n\nIf you do not configure this policy setting, the disable behavior applies, and in addition, users can configure this requirement themselves in the \"Add-ins\" category of the Trust Center for the application.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security","registrySubPath":"notbpromptunsignedaddin","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_DisableTrustedLoc","uniqueId":1051,"displayName":"Disable all trusted locations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows administrators to disable all trusted locations in the specified applications. Trusted locations specified in the Trust Center are used to define file locations that are assumed to be safe. Content, code, and add-ins are allowed to load from trusted locations with a minimal amount of security, without prompting the users for permission. If a dangerous file is opened from a trusted location, it will not be subject to standard security measures and could harm users' computers or data.\n      \nIf you enable this policy setting, all trusted locations (those specified in the Trust Center) in the specified applications are ignored, including any trusted locations established by Office 2016 during setup, deployed to users using Group Policy, or added by users themselves.  Users will be prompted again when opening files from trusted locations.\n\nIf you disable or do not configure this policy setting, all trusted locations (those specified in the Trust Center) in the specified applications are assumed to be safe.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations","registrySubPath":"alllocationsdisabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_Donotprompttoconvertolderdatabases","uniqueId":1179,"displayName":"Do not prompt to convert older databases","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Access prompts users to convert older databases when they are opened. \n      \nIf you enable this policy setting, Access will leave Access 97-format databases unchanged. Access informs the user that the database is in the older format, but does not provide the user with an option to convert the database. Some features introduced in more recent versions of Access will not be available, and the user will not be able to make any design changes to the database. \n      \nIf you disable or do not configure this policy setting, when users open databases that were created in the Access 97 file format, Access prompts them to convert the database to a newer file format. Users can choose to convert the database or leave it in the older format.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\settings","registrySubPath":"noconvertdialog","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_Followedhyperlinkcolor","uniqueId":1009,"displayName":"Followed hyperlink color","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_Followedhyperlinkcolor;L_followedhyperlinkcolor4","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the default text color of followed hyperlinks.","supportedPlatforms":["Windows"],"tags":["General","Web Options...","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_Followedhyperlinkcolor;L_followedhyperlinkcolor4","uniqueId":1008,"displayName":"Followed hyperlink color","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Black","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Maroon","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Green","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Olive","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Blue","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Violet","description":"","tags":[],"dependencyGroup":null},{"value":6,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Teal","description":"","tags":[],"dependencyGroup":null},{"value":7,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gray","description":"","tags":[],"dependencyGroup":null},{"value":8,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Silver","description":"","tags":[],"dependencyGroup":null},{"value":9,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Red","description":"","tags":[],"dependencyGroup":null},{"value":10,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bright Green","description":"","tags":[],"dependencyGroup":null},{"value":11,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yellow","description":"","tags":[],"dependencyGroup":null},{"value":12,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Blue","description":"","tags":[],"dependencyGroup":null},{"value":13,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Fuchsia","description":"","tags":[],"dependencyGroup":null},{"value":14,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Aqua","description":"","tags":[],"dependencyGroup":null},{"value":15,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"White","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Specifies the default text color of followed hyperlinks.","supportedPlatforms":["Windows"],"tags":["General","Web Options...","Application Settings","Microsoft Access 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\internet","registrySubPath":"followedhyperlinkcolor","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_GeneralAlignment","uniqueId":1003,"displayName":"General Alignment","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_GeneralAlignment;L_generalalignment1","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the default text alignment.","supportedPlatforms":["Windows"],"tags":["International","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_GeneralAlignment;L_generalalignment1","uniqueId":1002,"displayName":"General Alignment","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Interface mode","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Text mode","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Specifies the default text alignment.","supportedPlatforms":["Windows"],"tags":["International","Application Settings","Microsoft Access 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\settings","registrySubPath":"general alignment","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_Hyperlinkcolor","uniqueId":1007,"displayName":"Hyperlink color","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_Hyperlinkcolor;L_hyperlinkcolor3","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the default hyperlink text color.","supportedPlatforms":["Windows"],"tags":["General","Web Options...","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_Hyperlinkcolor;L_hyperlinkcolor3","uniqueId":1006,"displayName":"Hyperlink color","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Black","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Maroon","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Green","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Olive","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Blue","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Violet","description":"","tags":[],"dependencyGroup":null},{"value":6,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Teal","description":"","tags":[],"dependencyGroup":null},{"value":7,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gray","description":"","tags":[],"dependencyGroup":null},{"value":8,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Silver","description":"","tags":[],"dependencyGroup":null},{"value":9,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Red","description":"","tags":[],"dependencyGroup":null},{"value":10,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bright Green","description":"","tags":[],"dependencyGroup":null},{"value":11,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yellow","description":"","tags":[],"dependencyGroup":null},{"value":12,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Blue","description":"","tags":[],"dependencyGroup":null},{"value":13,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Fuchsia","description":"","tags":[],"dependencyGroup":null},{"value":14,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Aqua","description":"","tags":[],"dependencyGroup":null},{"value":15,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"White","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Specifies the default hyperlink text color.","supportedPlatforms":["Windows"],"tags":["General","Web Options...","Application Settings","Microsoft Access 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\internet","registrySubPath":"hyperlinkcolor","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_Listoferrormessagestocustomize","uniqueId":1156,"displayName":"List of error messages to customize","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_Listoferrormessagestocustomize;L_listoferrormessagestocustomize84","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines a list of custom error messages to activate.","supportedPlatforms":["Windows"],"tags":["Customizable Error Messages","Microsoft Access 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\customizablealerts","registrySubPath":"policyon","enforcedValues":{"enabled":1}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\customizablealerts","registrySubPath":"policyon","enforcedValues":{"enabled":1}}]}}},{"id":"access16;L_Listoferrormessagestocustomize;L_listoferrormessagestocustomize84","uniqueId":1155,"displayName":"List of error messages to customize","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"Defines a list of custom error messages to activate.","supportedPlatforms":["Windows"],"tags":["Customizable Error Messages","Microsoft Access 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\customizablealerts","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_ListOfManagedAddins","uniqueId":1185,"displayName":"List of managed add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_ListOfManagedAddins;L_ListOfManagedAddins2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify which add-ins are always enabled, always disabled (blocked), or configurable by the user. To block add-ins that are not managed by this policy setting, you must also configure the \"Block all unmanaged add-ins\" policy setting.\n\nTo enable this policy setting, provide the following information for each add-in:\n\nIn \"Value name,\" specify the programmatic identifier (ProgID) for COM add-ins.\n\nTo obtain the ProgID for an add-in, use Registry Editor on the client computer where the add-in is installed to locate key names under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Office\\Access\\Addins or HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Office\\Access\\Addins.\n\nYou can also obtain the ProgID of an add-in by using Office Telemetry Dashboard.\n\nIn \"Value,\" specify the value as follows:\n\nTo specify that an add-in is always disabled (blocked), type 0.\n\nTo specify that an add-in is always enabled, type 1.\n\nTo specify that an add-in is configurable by the user and not blocked by the \"Block all unmanaged add-ins\" policy setting when enabled, type 2.\n\nIf you disable or do not enable this policy setting, the list of managed add-ins is deleted. If the \"Block all unmanaged add-ins\" policy setting is enabled, then all add-ins are blocked.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Access 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\resiliency\\addinlist","registrySubPath":"policyon","enforcedValues":{"enabled":1}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\resiliency\\addinlist","registrySubPath":"policyon","enforcedValues":{"enabled":1}}]}}},{"id":"access16;L_ListOfManagedAddins;L_ListOfManagedAddins2","uniqueId":1184,"displayName":"List of managed add-ins","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to specify which add-ins are always enabled, always disabled (blocked), or configurable by the user. To block add-ins that are not managed by this policy setting, you must also configure the \"Block all unmanaged add-ins\" policy setting.\n\nTo enable this policy setting, provide the following information for each add-in:\n\nIn \"Value name,\" specify the programmatic identifier (ProgID) for COM add-ins.\n\nTo obtain the ProgID for an add-in, use Registry Editor on the client computer where the add-in is installed to locate key names under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Office\\Access\\Addins or HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Office\\Access\\Addins.\n\nYou can also obtain the ProgID of an add-in by using Office Telemetry Dashboard.\n\nIn \"Value,\" specify the value as follows:\n\nTo specify that an add-in is always disabled (blocked), type 0.\n\nTo specify that an add-in is always enabled, type 1.\n\nTo specify that an add-in is configurable by the user and not blocked by the \"Block all unmanaged add-ins\" policy setting when enabled, type 2.\n\nIf you disable or do not enable this policy setting, the list of managed add-ins is deleted. If the \"Block all unmanaged add-ins\" policy setting is enabled, then all add-ins are blocked.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Access 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\resiliency\\addinlist","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_ModalTrustDecisionOnly","uniqueId":1152,"displayName":"Modal Trust Decision Only","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls how Access notifies users about untrusted components. \n      \nIf you enable this policy setting, when users attempt to open an untrusted Access database that contains user-programmed executable components, users see a dialog box where they then must choose whether to enable or disable the components before they can work with the database. \n      \nIf you disable or do not configure this policy setting, when users open an untrusted Access database that contains user-programmed executable components, Access opens the database with the components disabled and displays the Message Bar with a warning that database content has been disabled. Users can inspect the contents of the database, but cannot use any disabled functionality until they enable it by clicking Options on the Message Bar and selecting the appropriate action.","supportedPlatforms":["Windows"],"tags":["Tools | Security","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security","registrySubPath":"modaltrustdecisiononly","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_NeverCachePolicy","uniqueId":1182,"displayName":"Never cache data","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to force databases that do not use Access 2016 compatible caching to not cache any data.\n\nIf you enable this policy setting, then data from Microsoft SharePoint or Business Data Catalog (BDC) will not be cached for databases that do not use Access 2016 compatible caching.  If the database uses Access 2016 compatible caching, then this policy setting will have no effect when enabled.\n\nIf you disable or do not configure this policy setting, then data from Microsoft SharePoint or Business Data Catalog (BDC) will be cached for databases that do not use Access 2016 compatible caching.  If the database uses Access 2016 compatible caching, then this policy setting will have no effect when disabled or not configured.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\settings","registrySubPath":"nevercache","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_PathtosharedWorkgroupinformationfileforsecuredMDBfiles","uniqueId":1154,"displayName":"Path to shared Workgroup information file for secured MDB files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_PathtosharedWorkgroupinformationfileforsecuredMDBfiles;L_pathtosharedworkgroupinformationfileforsecuredmdbfiles83","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the default path and filename for the workgroup information file.","supportedPlatforms":["Windows"],"tags":["Workgroup Administrator...","Tools | Security","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_PathtosharedWorkgroupinformationfileforsecuredMDBfiles;L_pathtosharedworkgroupinformationfileforsecuredmdbfiles83","uniqueId":1153,"displayName":"Path to shared Workgroup information file for secured MDB files","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specifies the default path and filename for the workgroup information file.","supportedPlatforms":["Windows"],"tags":["Workgroup Administrator...","Tools | Security","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\access connectivity engine\\engines","registrySubPath":"systemdb","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_PersonalTemplatesPath","uniqueId":1187,"displayName":"Personal templates path for Access","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_PersonalTemplatesPath;L_PersonalTemplatesPath","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the location of a user's personal templates. \n\nIf you enable this policy setting, users will see any templates they have saved in the specified location in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will change to be the specified location. \n\nIf you disable or do not configure this policy setting, users will not see templates they have saved in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will be their document save location.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_PersonalTemplatesPath;L_PersonalTemplatesPath","uniqueId":1186,"displayName":"Personal templates path for Access","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting specifies the location of a user's personal templates. \n\nIf you enable this policy setting, users will see any templates they have saved in the specified location in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will change to be the specified location. \n\nIf you disable or do not configure this policy setting, users will not see templates they have saved in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will be their document save location.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\settings","registrySubPath":"personaltemplatesaccess","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_Recentlyusedfilelist;L_Numberofentries","uniqueId":1011,"displayName":"Number of entries: ","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":50},"dataType":"Integer"},"description":"This policy setting specifies the number of entries displayed in the Recent list that appears when users click Open on the File tab in Backstage view.  \n\nIf you enable this policy setting, you can specify the number of entries to be between 0 and 50. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 25 items will be displayed in the Recent list.\n\nNote: If you want to prevent items from being added to the Recent list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["General","Application Settings","Microsoft Access 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\file mru","registrySubPath":"max display","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_Recentlyusedfilelist","uniqueId":1012,"displayName":"Number of files in the Recent list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_Recentlyusedfilelist;L_Numberofentries","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the number of entries displayed in the Recent list that appears when users click Open on the File tab in Backstage view.  \n\nIf you enable this policy setting, you can specify the number of entries to be between 0 and 50. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 25 items will be displayed in the Recent list.\n\nNote: If you want to prevent items from being added to the Recent list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["General","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_RequirethatApplicationExtensionsaresigned","uniqueId":1047,"displayName":"Require that application add-ins are signed by Trusted Publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether add-ins for this applications must be digitally signed by a trusted publisher.\n \nIf you enable this policy setting, this application checks the digital signature for each add-in before loading it. If an add-in does not have a digital signature, or if the signature did not come from a trusted publisher, this application disables the add-in and notifies the user. Certificates must be added to the Trusted Publishers list if you require that all add-ins be signed by a trusted publisher. For detail on about obtaining and distributing certificates, see http://go.microsoft.com/fwlink/?LinkId=294922. Office 2016 stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store.  Office 2016 still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store. Therefore, if you created a list of trusted publishers in a previous version of Office and you upgrade to Office 2016, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store. For more information about trusted publishers, see the Office Resource Kit.\n\nIf you disable or do not configure this policy setting, this application does not check the digital signature on application add-ins before opening them. If a dangerous add-in is loaded, it could harm users' computers or compromise data security.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security","registrySubPath":"requireaddinsig","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_SetCNGCipherAlgorithm","uniqueId":1018,"displayName":"Set CNG cipher algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_SetCNGCipherAlgorithm;L_SetCNGCipherAlgorithmID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the CNG cipher algorithm that is used.\n\nIf you enable this policy setting, then the cipher provided will be used if it is a supported algorithm.\n\nIf you disable or do not configure this policy setting, AES will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_SetCNGCipherAlgorithm;L_SetCNGCipherAlgorithmID","uniqueId":1017,"displayName":"CNG cipher algorithm:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to configure the CNG cipher algorithm that is used.\n\nIf you enable this policy setting, then the cipher provided will be used if it is a supported algorithm.\n\nIf you disable or do not configure this policy setting, AES will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Application Settings","Microsoft Access 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\crypto","registrySubPath":"cipheralgorithm","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_SetCNGCipherKeyLength","uniqueId":1022,"displayName":"Set CNG cipher key length","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_SetCNGCipherKeyLength;L_SetCNGCipherKeyLengthSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the number of bits to use when creating the cipher key.  This number will be rounded down to a multiple of 8.\n\nIf you enable this policy setting, the key bits specified will be used.\n\nIf you disable or do not configure this policy setting, the default value will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_SetCNGCipherKeyLength;L_SetCNGCipherKeyLengthSpinID","uniqueId":1021,"displayName":"Cipher key length","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":1000000},"dataType":"Integer"},"defaultValue":"","description":"This policy setting allows you to configure the number of bits to use when creating the cipher key.  This number will be rounded down to a multiple of 8.\n\nIf you enable this policy setting, the key bits specified will be used.\n\nIf you disable or do not configure this policy setting, the default value will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Application Settings","Microsoft Access 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\crypto","registrySubPath":"cipherkeybits","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_SetCNGPasswordSpinCount","uniqueId":1030,"displayName":"Set CNG password spin count","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_SetCNGPasswordSpinCount;L_SetCNGPasswordSpinCountSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the number of times to spin (rehash) the password verifier.\n\nIf you enable this policy setting, the number specified will be the number of times the password will be rehashed.\n\nIf you disable or do not configure this policy setting, the default (100000) will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_SetCNGPasswordSpinCount;L_SetCNGPasswordSpinCountSpinID","uniqueId":1029,"displayName":"Set CNG password spin count","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":10000000},"dataType":"Integer"},"defaultValue":"100000","description":"This policy setting allows you to specify the number of times to spin (rehash) the password verifier.\n\nIf you enable this policy setting, the number specified will be the number of times the password will be rehashed.\n\nIf you disable or do not configure this policy setting, the default (100000) will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Application Settings","Microsoft Access 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\crypto","registrySubPath":"passwordspincount","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_SetMaximumNumberOfTrustedDocuments","uniqueId":1036,"displayName":"Set maximum number of trusted documents","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_SetMaximumNumberOfTrustedDocuments;L_SetMaximumNumberOfTrustedDocumentsSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the maximum number of trust records for trusted documents that can be stored in the registry before the purge task runs. The purge task reduces the number of trusted documents stored in the registry to the value set by the \"Set maximum number of trust records to preserve\" policy setting.\n\nIf you enable this policy setting, you can specify the maximum number of trusted documents to be stored in the registry before the purge task runs, with an upper limit of 20,000 documents. For performance reasons, we do not recommend setting this policy setting to the upper limit.\n\nIf you disable or do not configure this policy setting, the default value of 500 is used for the maximum number of trusted documents that can be stored in the registry before the purge task runs.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_SetMaximumNumberOfTrustedDocuments;L_SetMaximumNumberOfTrustedDocumentsSpinID","uniqueId":1035,"displayName":"Maximum number:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":20000},"dataType":"Integer"},"defaultValue":"500","description":"This policy setting allows you to specify the maximum number of trust records for trusted documents that can be stored in the registry before the purge task runs. The purge task reduces the number of trusted documents stored in the registry to the value set by the \"Set maximum number of trust records to preserve\" policy setting.\n\nIf you enable this policy setting, you can specify the maximum number of trusted documents to be stored in the registry before the purge task runs, with an upper limit of 20,000 documents. For performance reasons, we do not recommend setting this policy setting to the upper limit.\n\nIf you disable or do not configure this policy setting, the default value of 500 is used for the maximum number of trusted documents that can be stored in the registry before the purge task runs.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted documents","registrySubPath":"maxtrusteddocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_SetMaximumNumberOfTrustRecordsToPreserve","uniqueId":1038,"displayName":"Set maximum number of trust records to preserve","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_SetMaximumNumberOfTrustRecordsToPreserve;L_SetMaximumNumberOfTrustRecordsToPreserveSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the maximum number of trust records to preserve when the purge task detects that this application has trusted more than the number of trusted documents set by the \"Set maximum number of trusted documents\" policy setting.\n\nIf you enable this policy setting, you may specify the maximum number of trust records to preserve, with an upper limit of 20000.  Due to performance reasons, it is not recommended to set it to the upper limit.\n\nIf you disable or you do not configure this policy setting, the default value for of 400 is used.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_SetMaximumNumberOfTrustRecordsToPreserve;L_SetMaximumNumberOfTrustRecordsToPreserveSpinID","uniqueId":1037,"displayName":"Maximum to preserve:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":20000},"dataType":"Integer"},"defaultValue":"400","description":"This policy setting allows you to specify the maximum number of trust records to preserve when the purge task detects that this application has trusted more than the number of trusted documents set by the \"Set maximum number of trusted documents\" policy setting.\n\nIf you enable this policy setting, you may specify the maximum number of trust records to preserve, with an upper limit of 20000.  Due to performance reasons, it is not recommended to set it to the upper limit.\n\nIf you disable or you do not configure this policy setting, the default value for of 400 is used.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted documents","registrySubPath":"maxpreservetrusteddocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_SetNumberOfPlacesInTheRecentPlacesList","uniqueId":1014,"displayName":"Number of folders in the Recent Folders list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_SetNumberOfPlacesInTheRecentPlacesList;L_SetNumberOfPlacesInTheRecentPlacesListSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the number of unpinned entries displayed in the Recent Folders list that appears when users click Open or Save As on the File tab in Backstage view.\n\nIf you enable this policy setting, you can specify the number of unpinned entries to be between 0 and 20. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 5 unpinned items are displayed in the Recent Folders list.\n\nNote: If you want to prevent items from being added to the Recent Folders list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["General","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_SetNumberOfPlacesInTheRecentPlacesList;L_SetNumberOfPlacesInTheRecentPlacesListSpinID","uniqueId":1013,"displayName":"Number of folders: ","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":20},"dataType":"Integer"},"defaultValue":"5","description":"This policy setting specifies the number of unpinned entries displayed in the Recent Folders list that appears when users click Open or Save As on the File tab in Backstage view.\n\nIf you enable this policy setting, you can specify the number of unpinned entries to be between 0 and 20. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 5 unpinned items are displayed in the Recent Folders list.\n\nNote: If you want to prevent items from being added to the Recent Folders list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["General","Application Settings","Microsoft Access 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\place mru","registrySubPath":"max display","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_SetParametersForCNGContext","uniqueId":1026,"displayName":"Set parameters for CNG context","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_SetParametersForCNGContext;L_SetParametersForCNGContextID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the encryption parameters that should be used for the CNG context. \n\nIf you enable this policy setting, the parameters specified will be passed to the CNG context.\n\nIf you disable or do not configure this policy setting, the default CNG values will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_SetParametersForCNGContext;L_SetParametersForCNGContextID","uniqueId":1025,"displayName":"Parameters","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to specify the encryption parameters that should be used for the CNG context. \n\nIf you enable this policy setting, the parameters specified will be passed to the CNG context.\n\nIf you disable or do not configure this policy setting, the default CNG values will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Application Settings","Microsoft Access 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\crypto","registrySubPath":"context","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_SpecifyCNGHashAlgorithm","uniqueId":1028,"displayName":"Specify CNG hash algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_SpecifyCNGHashAlgorithm;L_SpecifyCNGHashAlgorithmDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the hash algorithm used.\n\nIf you enable this policy setting, the hashing algorithm selected will be used by CNG.\n\nIf you disable or do not configure this policy setting, the default CNG hash algorithm will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_SpecifyCNGHashAlgorithm;L_SpecifyCNGHashAlgorithmDropID","uniqueId":1027,"displayName":"Specify CNG hash algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"SHA1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA1","description":"","tags":[],"dependencyGroup":null},{"value":"SHA256","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA256","description":"","tags":[],"dependencyGroup":null},{"value":"SHA384","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA384","description":"","tags":[],"dependencyGroup":null},{"value":"SHA512","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA512","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"SHA256","description":"This policy setting allows you to specify the hash algorithm used.\n\nIf you enable this policy setting, the hashing algorithm selected will be used by CNG.\n\nIf you disable or do not configure this policy setting, the default CNG hash algorithm will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Application Settings","Microsoft Access 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\crypto","registrySubPath":"hashalgorithm","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_SpecifyCNGRandomNumberGeneratorAlgorithm","uniqueId":1032,"displayName":"Specify CNG random number generator algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_SpecifyCNGRandomNumberGeneratorAlgorithm;L_SpecifyCNGRandomNumberGeneratorAlgorithmID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the CNG random number generator to use.\n\nIf you enable this policy setting, the random number generator specified will be used.\n\nIf you disable or do not configure this policy setting, the default random number generator will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_SpecifyCNGRandomNumberGeneratorAlgorithm;L_SpecifyCNGRandomNumberGeneratorAlgorithmID","uniqueId":1031,"displayName":"Random number generator:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to configure the CNG random number generator to use.\n\nIf you enable this policy setting, the random number generator specified will be used.\n\nIf you disable or do not configure this policy setting, the default random number generator will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Application Settings","Microsoft Access 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\crypto","registrySubPath":"rngalgorithm","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_SpecifyCNGSaltLength","uniqueId":1034,"displayName":"Specify CNG salt length","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_SpecifyCNGSaltLength;L_SpecifyCNGSaltLengthSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specific the number of bytes of salt that should be used.\n\nIf you enable this policy setting, the bytes specified will be used.\n\nIf you disable or do not configure this policy setting, the default length or 16 will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_SpecifyCNGSaltLength;L_SpecifyCNGSaltLengthSpinID","uniqueId":1033,"displayName":"Number of bytes","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":5000},"dataType":"Integer"},"defaultValue":"16","description":"This policy setting allows you to specific the number of bytes of salt that should be used.\n\nIf you enable this policy setting, the bytes specified will be used.\n\nIf you disable or do not configure this policy setting, the default length or 16 will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Application Settings","Microsoft Access 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\crypto","registrySubPath":"saltbytes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_SpecifyEncryptionCompatibility","uniqueId":1024,"displayName":"Specify encryption compatibility","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_SpecifyEncryptionCompatibility;L_SpecifyEncryptionCompatibilityDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the encrypted database compatibility.\n\nIf you enable this policy setting, the compatibility format specified will be applied during encryption for new files\n- Use legacy format\n- Use next generation format\n- All files save with next generation format\n\nIf you disable or do not configure this policy setting, the default setting, \"Use next generation format,\" will be applied.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_SpecifyEncryptionCompatibility;L_SpecifyEncryptionCompatibilityDropID","uniqueId":1023,"displayName":"Specify encryption compatibility","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use legacy format","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use next generation format","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"All files save with next generation format","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":2,"description":"This policy setting allows you to specify the encrypted database compatibility.\n\nIf you enable this policy setting, the compatibility format specified will be applied during encryption for new files\n- Use legacy format\n- Use next generation format\n- All files save with next generation format\n\nIf you disable or do not configure this policy setting, the default setting, \"Use next generation format,\" will be applied.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Application Settings","Microsoft Access 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\crypto","registrySubPath":"compatmode","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc01;L_Allowsubfolders","uniqueId":1055,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location1","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc01;L_Datecolon","uniqueId":1053,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location1","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc01;L_Descriptioncolon","uniqueId":1054,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location1","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc01;L_Pathcolon","uniqueId":1052,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location1","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc01","uniqueId":1056,"displayName":"Trusted Location #1","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_TrustedLoc01;L_Pathcolon","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc01;L_Datecolon","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc01;L_Descriptioncolon","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc01;L_Allowsubfolders","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_TrustedLoc02;L_allowsubfolders10","uniqueId":1060,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location2","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc02;L_datecolon8","uniqueId":1058,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location2","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc02;L_descriptioncolon9","uniqueId":1059,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location2","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc02;L_pathcolon7","uniqueId":1057,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location2","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc02","uniqueId":1061,"displayName":"Trusted Location #2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_TrustedLoc02;L_pathcolon7","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc02;L_datecolon8","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc02;L_descriptioncolon9","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc02;L_allowsubfolders10","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_TrustedLoc03;L_allowsubfolders14","uniqueId":1065,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location3","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc03;L_datecolon12","uniqueId":1063,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location3","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc03;L_descriptioncolon13","uniqueId":1064,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location3","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc03;L_pathcolon11","uniqueId":1062,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location3","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc03","uniqueId":1066,"displayName":"Trusted Location #3","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_TrustedLoc03;L_pathcolon11","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc03;L_datecolon12","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc03;L_descriptioncolon13","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc03;L_allowsubfolders14","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_TrustedLoc04;L_allowsubfolders18","uniqueId":1070,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location4","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc04;L_datecolon16","uniqueId":1068,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location4","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc04;L_descriptioncolon17","uniqueId":1069,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location4","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc04;L_pathcolon15","uniqueId":1067,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location4","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc04","uniqueId":1071,"displayName":"Trusted Location #4","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_TrustedLoc04;L_pathcolon15","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc04;L_datecolon16","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc04;L_descriptioncolon17","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc04;L_allowsubfolders18","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_TrustedLoc05;L_allowsubfolders22","uniqueId":1075,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location5","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc05;L_datecolon20","uniqueId":1073,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location5","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc05;L_descriptioncolon21","uniqueId":1074,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location5","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc05;L_pathcolon19","uniqueId":1072,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location5","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc05","uniqueId":1076,"displayName":"Trusted Location #5","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_TrustedLoc05;L_pathcolon19","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc05;L_datecolon20","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc05;L_descriptioncolon21","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc05;L_allowsubfolders22","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_TrustedLoc06;L_allowsubfolders26","uniqueId":1080,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location6","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc06;L_datecolon24","uniqueId":1078,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location6","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc06;L_descriptioncolon25","uniqueId":1079,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location6","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc06;L_pathcolon23","uniqueId":1077,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location6","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc06","uniqueId":1081,"displayName":"Trusted Location #6","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_TrustedLoc06;L_pathcolon23","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc06;L_datecolon24","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc06;L_descriptioncolon25","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc06;L_allowsubfolders26","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_TrustedLoc07;L_allowsubfolders30","uniqueId":1085,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location7","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc07;L_datecolon28","uniqueId":1083,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location7","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc07;L_descriptioncolon29","uniqueId":1084,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location7","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc07;L_pathcolon27","uniqueId":1082,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location7","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc07","uniqueId":1086,"displayName":"Trusted Location #7","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_TrustedLoc07;L_pathcolon27","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc07;L_datecolon28","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc07;L_descriptioncolon29","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc07;L_allowsubfolders30","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_TrustedLoc08;L_allowsubfolders34","uniqueId":1090,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location8","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc08;L_datecolon32","uniqueId":1088,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location8","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc08;L_descriptioncolon33","uniqueId":1089,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location8","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc08;L_pathcolon31","uniqueId":1087,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location8","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc08","uniqueId":1091,"displayName":"Trusted Location #8","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_TrustedLoc08;L_pathcolon31","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc08;L_datecolon32","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc08;L_descriptioncolon33","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc08;L_allowsubfolders34","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_TrustedLoc09;L_allowsubfolders38","uniqueId":1095,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location9","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc09;L_datecolon36","uniqueId":1093,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location9","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc09;L_descriptioncolon37","uniqueId":1094,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location9","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc09;L_pathcolon35","uniqueId":1092,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location9","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc09","uniqueId":1096,"displayName":"Trusted Location #9","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_TrustedLoc09;L_pathcolon35","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc09;L_datecolon36","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc09;L_descriptioncolon37","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc09;L_allowsubfolders38","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_TrustedLoc10;L_allowsubfolders42","uniqueId":1100,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location10","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc10;L_datecolon40","uniqueId":1098,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location10","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc10;L_descriptioncolon41","uniqueId":1099,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location10","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc10;L_pathcolon39","uniqueId":1097,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location10","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc10","uniqueId":1101,"displayName":"Trusted Location #10","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_TrustedLoc10;L_pathcolon39","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc10;L_datecolon40","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc10;L_descriptioncolon41","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc10;L_allowsubfolders42","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_TrustedLoc11;L_allowsubfolders46","uniqueId":1105,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location11","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc11;L_datecolon44","uniqueId":1103,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location11","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc11;L_descriptioncolon45","uniqueId":1104,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location11","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc11;L_pathcolon43","uniqueId":1102,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location11","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc11","uniqueId":1106,"displayName":"Trusted Location #11","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_TrustedLoc11;L_pathcolon43","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc11;L_datecolon44","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc11;L_descriptioncolon45","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc11;L_allowsubfolders46","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_TrustedLoc12;L_allowsubfolders50","uniqueId":1110,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location12","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc12;L_datecolon48","uniqueId":1108,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location12","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc12;L_descriptioncolon49","uniqueId":1109,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location12","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc12;L_pathcolon47","uniqueId":1107,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location12","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc12","uniqueId":1111,"displayName":"Trusted Location #12","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_TrustedLoc12;L_pathcolon47","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc12;L_datecolon48","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc12;L_descriptioncolon49","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc12;L_allowsubfolders50","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_TrustedLoc13;L_allowsubfolders54","uniqueId":1115,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location13","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc13;L_datecolon52","uniqueId":1113,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location13","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc13;L_descriptioncolon53","uniqueId":1114,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location13","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc13;L_pathcolon51","uniqueId":1112,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location13","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc13","uniqueId":1116,"displayName":"Trusted Location #13","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_TrustedLoc13;L_pathcolon51","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc13;L_datecolon52","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc13;L_descriptioncolon53","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc13;L_allowsubfolders54","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_TrustedLoc14;L_allowsubfolders58","uniqueId":1120,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location14","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc14;L_datecolon56","uniqueId":1118,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location14","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc14;L_descriptioncolon57","uniqueId":1119,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location14","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc14;L_pathcolon55","uniqueId":1117,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location14","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc14","uniqueId":1121,"displayName":"Trusted Location #14","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_TrustedLoc14;L_pathcolon55","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc14;L_datecolon56","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc14;L_descriptioncolon57","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc14;L_allowsubfolders58","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_TrustedLoc15;L_allowsubfolders62","uniqueId":1125,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location15","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc15;L_datecolon60","uniqueId":1123,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location15","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc15;L_descriptioncolon61","uniqueId":1124,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location15","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc15;L_pathcolon59","uniqueId":1122,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location15","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc15","uniqueId":1126,"displayName":"Trusted Location #15","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_TrustedLoc15;L_pathcolon59","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc15;L_datecolon60","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc15;L_descriptioncolon61","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc15;L_allowsubfolders62","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_TrustedLoc16;L_allowsubfolders66","uniqueId":1130,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location16","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc16;L_datecolon64","uniqueId":1128,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location16","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc16;L_descriptioncolon65","uniqueId":1129,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location16","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc16;L_pathcolon63","uniqueId":1127,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location16","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc16","uniqueId":1131,"displayName":"Trusted Location #16","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_TrustedLoc16;L_pathcolon63","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc16;L_datecolon64","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc16;L_descriptioncolon65","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc16;L_allowsubfolders66","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_TrustedLoc17;L_allowsubfolders70","uniqueId":1135,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location17","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc17;L_datecolon68","uniqueId":1133,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location17","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc17;L_descriptioncolon69","uniqueId":1134,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location17","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc17;L_pathcolon67","uniqueId":1132,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location17","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc17","uniqueId":1136,"displayName":"Trusted Location #17","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_TrustedLoc17;L_pathcolon67","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc17;L_datecolon68","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc17;L_descriptioncolon69","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc17;L_allowsubfolders70","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_TrustedLoc18;L_allowsubfolders74","uniqueId":1140,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location18","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc18;L_datecolon72","uniqueId":1138,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location18","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc18;L_descriptioncolon73","uniqueId":1139,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location18","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc18;L_pathcolon71","uniqueId":1137,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location18","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc18","uniqueId":1141,"displayName":"Trusted Location #18","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_TrustedLoc18;L_pathcolon71","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc18;L_datecolon72","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc18;L_descriptioncolon73","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc18;L_allowsubfolders74","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_TrustedLoc19;L_allowsubfolders78","uniqueId":1145,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location19","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc19;L_datecolon76","uniqueId":1143,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location19","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc19;L_descriptioncolon77","uniqueId":1144,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location19","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc19;L_pathcolon75","uniqueId":1142,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location19","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc19","uniqueId":1146,"displayName":"Trusted Location #19","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_TrustedLoc19;L_pathcolon75","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc19;L_datecolon76","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc19;L_descriptioncolon77","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc19;L_allowsubfolders78","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_TrustedLoc20;L_allowsubfolders82","uniqueId":1150,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location20","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc20;L_datecolon80","uniqueId":1148,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location20","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc20;L_descriptioncolon81","uniqueId":1149,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location20","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc20;L_pathcolon79","uniqueId":1147,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted locations\\location20","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"access16;L_TrustedLoc20","uniqueId":1151,"displayName":"Trusted Location #20","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_TrustedLoc20;L_pathcolon79","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc20;L_datecolon80","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc20;L_descriptioncolon81","logicalOperator":"exists","values":null},{"dependee":"access16;L_TrustedLoc20;L_allowsubfolders82","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"access16;L_TurnOffTrustedDocuments","uniqueId":1049,"displayName":"Turn off trusted documents","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off the trusted documents feature.  The trusted documents feature allows users to always enable active content in documents such as macros, ActiveX controls, data connections, etc. so that they are not prompted the next time they open the documents.  Trusted documents are exempt from security notifications.\n\nIf you enable this policy setting, you will turn off the trusted documents feature.  Users will receive a security prompt every time a document containing active content is opened.\n\nIf you disable or do not configure this policy setting, documents will be trusted when users enable content for a document, and users will not receive a security prompt.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted documents","registrySubPath":"disabletrusteddocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_TurnOffTrustedDocumentsOnTheNetwork","uniqueId":1045,"displayName":"Turn off Trusted Documents on the network","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off the trusted documents feature for documents opened from the network.\n\nIf you enable this policy setting, users will always see security notifications for active content such as macros, ActiveX controls, data connections, etc. for documents opened from the network.\n\nIf you disable or do not configure this policy setting, the trusted documents feature allows users to always allow active content in documents such as macros, ActiveX controls, data connections, etc. so that users are not prompted the next time they open the documents.  Trusted documents are exempt from security notifications.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security\\trusted documents","registrySubPath":"disablenetworktrusteddocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_Underlinehyperlinks","uniqueId":1010,"displayName":"Underline hyperlinks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether hyperlinks in Access tables, queries, forms, and reports are underlined. \n      \nIf you enable this policy setting, Access underlines all hyperlinks in tables, queries, forms, and reports when they are created, overriding any configuration changes on the users' computers. \n      \nIf you disable this policy setting, Access does not underline hyperlinks in tables, queries, forms and reports. \n      \nIf you do not configure this policy setting, Access underlines hyperlinks that appear in tables, queries, forms, and reports. \n      \nEnabling this policy setting enforces the default configuration in Access, and is therefore unlikely to cause a significant usability issue for most users. If this configuration is changed, users might click on dangerous hyperlinks without realizing it, which could pose a security risk.","supportedPlatforms":["Windows"],"tags":["General","Web Options...","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\internet","registrySubPath":"donotunderlinehyperlinks","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_VBAWarningsPolicy;L_Empty","uniqueId":1039,"displayName":"VBA Macro Notification Settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable all with notification","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable all except digitally signed macros","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable all without notification","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable all macros (not recommended)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":3,"recommendation":"security"}],"defaultValue":2,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n \nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security","registrySubPath":"vbawarnings","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_VBAWarningsPolicy;L_VBADigSigTrustedPublishersStr","uniqueId":1040,"displayName":"Require macros to be signed by a trusted publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n \nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security","registrySubPath":"vbadigsigtrustedpublishers","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_VBAWarningsPolicy;L_VBAOnlyAllowDigSigWithCodeSigningEKUStr","uniqueId":1042,"displayName":"Require Extended Key Usage (EKU) for certificates from trusted publishers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n \nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security","registrySubPath":"vbarequiredigsigwithcodesigningeku","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_VBAWarningsPolicy;L_VBAOnlyAllowLMTrustedPublisherStr","uniqueId":1041,"displayName":"Block certificates from trusted publishers that are only installed in the current user certificate store","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n \nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\access\\security","registrySubPath":"vbarequirelmtrustedpublisher","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"access16;L_VBAWarningsPolicy","uniqueId":1043,"displayName":"VBA Macro Notification Settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"access16;L_VBAWarningsPolicy;L_Empty","logicalOperator":"exists","values":null},{"dependee":"access16;L_VBAWarningsPolicy;L_VBADigSigTrustedPublishersStr","logicalOperator":"exists","values":null},{"dependee":"access16;L_VBAWarningsPolicy;L_VBAOnlyAllowLMTrustedPublisherStr","logicalOperator":"exists","values":null},{"dependee":"access16;L_VBAWarningsPolicy;L_VBAOnlyAllowDigSigWithCodeSigningEKUStr","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n \nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Application Settings","Microsoft Access 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"clipchamp;L_DisableClipChampAITextToSpeech","uniqueId":5402,"displayName":"Disable AI text to speech​ in Clipchamp","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether users can use the AI text-to-speech tool in the Clipchamp video editor.\n\nIf you enable this policy setting, users can't generate speech from text using the AI text-to-speech tool.\n\nIf you disable this policy setting, users can generate speech from text using the AI text-to-speech tool.\n\nIf you don't configure this policy setting, users can generate speech from text using the AI text-to-speech tool.\n\nNote: For US government GCC M, GCC H, and DoD customers, Clipchamp/Stream admin policies do not apply and making any changes to this policy will not impact the Clipchamp/Stream applications. If you wish to prevent access to Microsoft Clipchamp for your users, please refer to the following support article: https://support.microsoft.com/en-us/topic/how-to-enable-or-disable-the-clipchamp-video-editor-for-users-in-your-organization-5b74028f-6dd8-423c-a6cb-8e2b8b42c6e7","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["DisableClipChampAITextToSpeech","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\clipchamp","registrySubPath":"DisableClipChampAITextToSpeech","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"clipchamp;L_DisableClipChampAITranscriptGeneration","uniqueId":5403,"displayName":"Disable AI transcription generation (subtitles/captions) in Clipchamp video-editor","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether users can use the AI transcription generation tool in the Clipchamp video-editor.\n\nIf you enable this policy setting, users can't generate transcriptions (subtitles/captions) from audio or video media files.\n\nIf you disable this policy setting, users can generate transcriptions (subtitles/captions) from audio or video media files.\n\nIf you don't configure this policy setting, users can generate transcriptions (subtitles/captions) from audio or video media files.\n\nNote: to disable AI transcription generation in the Clipchamp video player (previously known as Microsoft Stream). Follow the instructions in the following article: https://support.microsoft.com/en-us/topic/how-to-enable-or-disable-features-in-clipchamp-for-users-in-your-organization-776d1ac6-7141-46d8-b12b-444928f752ac \n\nNote: For US government GCC M, GCC H, and DoD customers, Clipchamp/Stream admin policies do not apply and making any changes to this policy will not impact the Clipchamp/Stream applications. If you wish to prevent access to Microsoft Clipchamp for your users, please refer to the following support article: https://support.microsoft.com/en-us/topic/how-to-enable-or-disable-the-clipchamp-video-editor-for-users-in-your-organization-5b74028f-6dd8-423c-a6cb-8e2b8b42c6e7","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["DisableClipChampAITranscriptGeneration","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\clipchamp","registrySubPath":"DisableClipChampAITranscriptGeneration","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"clipchamp;L_DisableClipChampAudioRecording","uniqueId":5404,"displayName":"Disable audio recording in Clipchamp and Microsoft Stream","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether users can use the audio recording tool in Clipchamp and Microsoft Stream.\n\nIf you enable this policy setting, users can record their microphone with the audio recording tool.\n\nIf you disable this policy setting, users can't record their microphone with the audio recording tool.\n\nIf you don't configure this policy setting, users can record their microphone with the audio recording tool.\n\nNote: For US government GCC M, GCC H, and DoD customers, Clipchamp/Stream admin policies do not apply and making any changes to this policy will not impact the Clipchamp/Stream applications. If you wish to prevent access to Microsoft Clipchamp for your users, please refer to the following support article: https://support.microsoft.com/en-us/topic/how-to-enable-or-disable-the-clipchamp-video-editor-for-users-in-your-organization-5b74028f-6dd8-423c-a6cb-8e2b8b42c6e7","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["DisableClipChampAudioRecording","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\clipchamp","registrySubPath":"DisableClipChampAudioRecording","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"clipchamp;L_DisableClipChampPremiumUpgrade","uniqueId":5405,"displayName":"Disable the ability for users to upgrade to Clipchamp Premium​","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether users can request an upgrade to Clipchamp Premium from within the Clipchamp video editor.\n\nIf you enable this policy setting, users can't request to upgrade their plan to Clipchamp Premium.\n\nIf you disable this policy setting, users can request to upgrade their plan to Clipchamp Premium from within the Clipchamp video editor.\n\nIf you don't configure this policy setting, users can request to upgrade their plan to Clipchamp Premium from within the Clipchamp video editor.\n\nNote: For US government GCC M, GCC H, and DoD customers, Clipchamp/Stream admin policies do not apply and making any changes to this policy will not impact the Clipchamp/Stream applications. If you wish to prevent access to Microsoft Clipchamp for your users, please refer to the following support article: https://support.microsoft.com/en-us/topic/how-to-enable-or-disable-the-clipchamp-video-editor-for-users-in-your-organization-5b74028f-6dd8-423c-a6cb-8e2b8b42c6e7","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["DisableClipChampPremiumUpgrade","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\clipchamp","registrySubPath":"DisableClipChampPremiumUpgrade","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"clipchamp;L_DisableClipChampScreenRecording","uniqueId":5406,"displayName":"Disable screen recording in Clipchamp and Microsoft Stream","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether users can use the screen recording tool in the Clipchamp and Stream toolset.\n\nIf you enable this policy setting, users can't record their screen with the screen recording tool.\n\nIf you disable this policy setting, users can record their screen with the screen recording tool.\n\nIf you don't configure this policy setting, users can record their screen with the screen recording tool.\n\nNote: For US government GCC M, GCC H, and DoD customers, Clipchamp/Stream admin policies do not apply and making any changes to this policy will not impact the Clipchamp/Stream applications. If you wish to prevent access to Microsoft Clipchamp for your users, please refer to the following support article: https://support.microsoft.com/en-us/topic/how-to-enable-or-disable-the-clipchamp-video-editor-for-users-in-your-organization-5b74028f-6dd8-423c-a6cb-8e2b8b42c6e7","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["DisableClipChampScreenRecording","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\clipchamp","registrySubPath":"DisableClipChampScreenRecording","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"clipchamp;L_DisableClipChampVideoDownload","uniqueId":5407,"displayName":"Disable downloading videos on local devices in Clipchamp and Microsoft Stream","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether users can download videos from Clipchamp and Microsoft Stream onto their local devices.\n\nIf you enable this policy setting, users can't download videos from Clipchamp and Microsoft Stream onto their local devices.\n\nIf you disable this policy setting, users can download videos from Clipchamp and Microsoft Stream onto their local devices.\n\nIf you don't configure this policy setting, users can download videos from Clipchamp and Microsoft Stream onto their local devices.\n\nNote: For US government GCC M, GCC H, and DoD customers, Clipchamp/Stream admin policies do not apply and making any changes to this policy will not impact the Clipchamp/Stream applications. If you wish to prevent access to Microsoft Clipchamp for your users, please refer to the following support article: https://support.microsoft.com/en-us/topic/how-to-enable-or-disable-the-clipchamp-video-editor-for-users-in-your-organization-5b74028f-6dd8-423c-a6cb-8e2b8b42c6e7","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["DisableClipChampVideoDownload","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\clipchamp","registrySubPath":"DisableClipChampVideoDownload","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"clipchamp;L_DisableClipChampWebcamRecording","uniqueId":5408,"displayName":"Disable webcam recording in Clipchamp and Microsoft Stream","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether users can use the webcam recording tool in Clipchamp and Microsoft Stream.\n\nIf you enable this policy setting, users can't record their camera with the webcam recording tool.\n\nIf you disable this policy setting, users can record their camera with the webcam recording tool.\n\nIf you don't configure this policy setting, users can record their camera with the webcam recording tool.\n\nNote: For US government GCC M, GCC H, and DoD customers, Clipchamp/Stream admin policies do not apply and making any changes to this policy will not impact the Clipchamp/Stream applications. If you wish to prevent access to Microsoft Clipchamp for your users, please refer to the following support article: https://support.microsoft.com/en-us/topic/how-to-enable-or-disable-the-clipchamp-video-editor-for-users-in-your-organization-5b74028f-6dd8-423c-a6cb-8e2b8b42c6e7","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["DisableClipChampWebcamRecording","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\clipchamp","registrySubPath":"DisableClipChampWebcamRecording","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"cortana;C_AllowBingAnswersInCortana","uniqueId":5304,"displayName":"Allow Bing Answers to respond to questions users ask Cortana","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether Bing Answers is available to your users when they ask questions to Cortana.\n\nWhen the Bing Answers policy is enabled, in the Cortana UWP app, users will be able to ask Cortana \"web-related\" questions, such as \"What’s the current weather\" or \"Who is the president of the U.S.,\" and get a response, based on public results from Bing.com. Bing Answers provides fast, authoritative results to search queries based on keywords.\n\nThe above experience is powered by Microsoft Bing, and Cortana sends the user queries to Bing. The use of Microsoft Bing is governed by the Microsoft Services Agreement (https://www.microsoft.com/en-us/servicesagreement) and Privacy Statement (https://privacy.microsoft.com/en-US/privacystatement). When a user enters a search query (by speech or text), Cortana evaluates if the request is for any of our first-party compliant skills if enabled in a specific market, and does the following:\n\n- If it is for any of the first-party compliant skills, the query is sent to that skill, and results/action are returned\n\n- If it is not for any of the first-party compliant skills, the query is sent to Bing for a search of public results from Bing.com. Because enterprise searches might be sensitive, similar to Microsoft Search in Bing, Bing Answers in Cortana has implemented a set of trust measures, described below, that govern how the separate search of public results from Bing.com is handled. The Bing Answers in Cortana trust measures are consistent with the enhanced privacy and security measures described in Microsoft Search in Bing.\n\nLogging\n\nAll Bing.com search logs that pertain to Cortana traffic are disassociated from users’ workplace identity.\n\nAll Cortana queries issued via a specific organization are stored separately from public, non-Cortana traffic.\n\nAdvertising\n\nAdvertising shown on Bing.com in connection with workplace searches is solely related to the content of the search queries. Ads are never targeted to users based on their workplace identity.","supportedPlatforms":["Windows"],"tags":["Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"allowbinganswersincortana","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Alertbeforeoverwritingcells","uniqueId":1462,"displayName":"Alert before overwriting cells","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting sets the \"Alert before overwriting cells\" option found under File tab | Options | Advanced | Editing Options.\n\nIf you enable or do not configure this policy setting, Excel will give a warning if cells are about to be overwritten.  This is the default behavior.\n\nIf you disable this policy setting, Excel will suppress the warning that cells are about to be overwritten.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"fnodragwarning_76_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_AllowQuickAnalysis","uniqueId":1522,"displayName":"Show Quick Analysis options on selection","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls the \"Show Quick Analysis options on selection\" option found under File tab | Options | General | User Interface Options.\n\nIf you enable or do not configure this policy setting, Excel will show Quick Analysis options when data is selected. This is the default behavior.\n\nIf you disable this policy setting, Excel will not show these options on selection.","supportedPlatforms":["Windows"],"tags":["General","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\excel","registrySubPath":"allowquickanalysis","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_AllowSelectionFloaties","uniqueId":1205,"displayName":"Show Mini Toolbar on selection","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Disabling this policy setting will result in Mini Toolbar not being displayed on text selection. By default, Mini Toolbar on selection is enabled and its visibility can be changed via a setting in the Excel Options dialog box.","supportedPlatforms":["Windows"],"tags":["General","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\excel","registrySubPath":"allowselectionfloaties","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_AllowTrustedLocationsOnTheNetwork","uniqueId":1343,"displayName":"Allow Trusted Locations on the network","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting controls whether trusted locations on the network can be used.\n\nIf you enable this policy setting, users can specify trusted locations on network shares or in other remote locations that are not under their direct control by clicking the \"Add new location\" button in the Trusted Locations section of the Trust Center. Content, code, and add-ins are allowed to load from trusted locations with minimal security and without prompting the user for permission.\n\nIf you disable this policy setting, the selected application ignores any network locations listed in the Trusted Locations section of the Trust Center. \n\nIf you also deploy Trusted Locations via Group Policy, you should verify whether any of them are remote locations. If any of them are remote locations and you do not allow remote locations via this policy setting, those policy keys that point to remote locations will be ignored on client computers.\n\nDisabling this policy setting does not delete any network locations from the Trusted Locations list, but causes disruption for users who add network locations to the Trusted Locations list. Users are also prevented from adding new network locations to the Trusted Locations list in the Trust Center.  We recommended that you do not enable this policy setting (as the \"Allow Trusted Locations on my network (not recommended)\" check box also states). Therefore, in practice, it should be possible to disable this policy setting in most situations without causing significant usability issues for most users.\n\nIf you do not enable this policy setting, users can select the \"Allow Trusted Locations on my network (not recommended)\" check box if desired and then specify trusted locations by clicking the \"Add new location\" button.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations","registrySubPath":"allownetworklocations","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Alternatestartupfilelocation","uniqueId":1482,"displayName":"Alternate startup file location","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Alternatestartupfilelocation;L_alternatestartupfilelocation86","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the folder where files will be opened by Excel at startup.\n\nIf you enable this policy setting, you may specify the folder where files will be opened by Excel at startup.  Files will be opened from this folder in addition to the XLSTART folder in the Microsoft Office installation directory (default C:\\Program Files\\Microsoft Office\\Office14\\XLSTART).\n\nIf you disable or do not configure this policy setting, files will only be opened from the XLSTART folder.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Alternatestartupfilelocation;L_alternatestartupfilelocation86","uniqueId":1481,"displayName":"Alternate startup file location","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify the folder where files will be opened by Excel at startup.\n\nIf you enable this policy setting, you may specify the folder where files will be opened by Excel at startup.  Files will be opened from this folder in addition to the XLSTART folder in the Microsoft Office installation directory (default C:\\Program Files\\Microsoft Office\\Office14\\XLSTART).\n\nIf you disable or do not configure this policy setting, files will only be opened from the XLSTART folder.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"altstartup","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Asktoupdateautomaticlinks","uniqueId":1468,"displayName":"Ask to update automatic links","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting controls whether Excel prompts users to update automatic links, or whether the updates occur in the background with no prompt.\n      \nIf you enable or do not configure this policy setting, Excel will prompt users to update automatic links. In addition, the \"Ask to update automatic links\" user interface option under File tab | Advanced | General is selected.\n      \nIf you disable this policy setting, Excel updates automatic links without prompting or informing users, which could compromise the integrity of some of the information in the workbook.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"fupdateext_78_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_AutomaticallyFlashFill","uniqueId":1518,"displayName":"Automatically Flash Fill","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls the \"Automatically Flash Fill\" option found under File tab | Options | Advanced | Editing Options.\n\nIf you enable or do not configure this policy setting, Excel will enable automatic Flash Fill. This is the default behavior.\n\nIf you disable this policy setting, Excel will turn off the Automatic Flash Fill feature.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"flashfill","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Automaticallyinsertadecimalpoint","uniqueId":1466,"displayName":"Automatically insert a decimal point","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy setting allows you to configure the \"Automatically insert a decimal point\" option.\n\nIf you enable this policy setting, the \"Automatically insert a decimal point\" option will be checked and the Places option is set to 2.\n\nIf you disable or do not configure this policy setting, the \"Automatically insert a decimal point\" option will not be checked.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"autodec","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_AutoRecoverdelay","uniqueId":1221,"displayName":"AutoRecover delay","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_AutoRecoverdelay;L_SecondsofidletimebeforeAutoRecoverstarts","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy specifies how long (in seconds) the user must be idle before AutoRecover information will be saved.","supportedPlatforms":["Windows"],"tags":["Save","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_AutoRecoverdelay;L_SecondsofidletimebeforeAutoRecoverstarts","uniqueId":1220,"displayName":"Seconds of idle time before AutoRecover starts","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":600},"dataType":"Integer"},"description":"This policy specifies how long (in seconds) the user must be idle before AutoRecover information will be saved.","supportedPlatforms":["Windows"],"tags":["Save","Excel Options","Microsoft Excel 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"autorecoverdelay","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_AutoRecoversavelocation","uniqueId":1219,"displayName":"AutoRecover save location","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_AutoRecoversavelocation;L_autorecoversavelocation2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the location where AutoRecover information is to be saved.  Directing the location to a network drive may allow you to back up these files along with other network files.\n\nIf you enable this policy setting, you may specify the location where AutoRecover information is to be saved.\n\nIf you disable or you do not configure this policy setting, the default location is %userprofile%\\Application Data\\Microsoft\\Excel.","supportedPlatforms":["Windows"],"tags":["Save","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_AutoRecoversavelocation;L_autorecoversavelocation2","uniqueId":1218,"displayName":"AutoRecover save location","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify the location where AutoRecover information is to be saved.  Directing the location to a network drive may allow you to back up these files along with other network files.\n\nIf you enable this policy setting, you may specify the location where AutoRecover information is to be saved.\n\nIf you disable or you do not configure this policy setting, the default location is %userprofile%\\Application Data\\Microsoft\\Excel.","supportedPlatforms":["Windows"],"tags":["Save","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"autorecoverpath","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_AutoRecovertime","uniqueId":1217,"displayName":"AutoRecover time","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_AutoRecovertime;L_SaveAutoRecoverinfoevery","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy determines the interval (in minutes) at which AutoRecover information will be saved.","supportedPlatforms":["Windows"],"tags":["Save","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_AutoRecovertime;L_SaveAutoRecoverinfoevery","uniqueId":1216,"displayName":"Save AutoRecover info every (minutes):","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":120},"dataType":"Integer"},"description":"This policy determines the interval (in minutes) at which AutoRecover information will be saved.","supportedPlatforms":["Windows"],"tags":["Save","Excel Options","Microsoft Excel 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"autorecovertime","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_BackgroundAccessibilityCheckerInformation","uniqueId":1197,"displayName":"Check for accessibility issues while editing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting controls whether accessibility issues are checked for automatically while the user is editing a workbook. By default, accessibility issues aren’t checked for automatically.\n\nIf you enable this policy setting, accessibility issues are checked for automatically and users won’t be able to turn it off. The status bar will indicate if accessibility recommendations are available to make the workbook more usable by people with disabilities.\n\nIf you disable or don’t configure this policy setting, accessibility issues won’t be checked for automatically while editing a workbook. Users can turn on automatic checking by going to File > Options > Ease of Access.\n","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File tab","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"enableaccchecker","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_BlockAllUnmanagedAddins","uniqueId":1515,"displayName":"Block all unmanaged add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting blocks all add-ins that are not managed by the \"List of managed add-ins\" policy setting.\n\nIf you enable this policy setting, and the \"List of managed add-ins\" policy setting is also enabled, all add-ins are blocked except those that are configured as 1 (always enabled) or 2 (configurable by the user) in the \"List of managed add-ins\" policy setting.\n\nIf you disable or do not configure this policy setting, users can enable or disable any add-ins that are not managed by the \"List of managed add-ins\" policy setting.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\resiliency","registrySubPath":"restricttolist","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_BlockMacroExecutionFromInternet","uniqueId":1281,"displayName":"Block macros from running in Office files from the internet","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"\n        This policy setting allows you to block macros from running in Office files that come from the internet.\n\n        If you enable this policy setting, macros are blocked from running, even if \"Enable all macros\" is selected in the Macro Settings section of the Trust Center. Users will receive a notification that macros are blocked from running.\n\n        The exceptions when macros will be allowed to run are:\n        - The Office file is saved to a Trusted Location.\n        - The Office file was previously trusted by the user.\n        - Macros are digitally signed and the matching Trusted Publisher certificate is installed on the device.\n\n        If you disable this policy setting, the settings configured in the Macro Settings section of the Trust Center determine whether macros run in Office files that come from the internet.\n\n        If you don’t configure this policy setting, macros will be blocked from running. Users will receive a notification telling them of the security risks of macros from the internet along with a link to learn more.\n\n        For more information, see https://go.microsoft.com/fwlink/p/?linkid=2185771.\n      ","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security","registrySubPath":"blockcontentexecutionfrominternet","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_BlockXLLFromInternet","uniqueId":1283,"displayName":"Block Excel XLL Add-ins that come from an untrusted source","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_BlockXLLFromInternet;L_BlockXLLFromInternetEnum","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\n        This policy setting allows you to block Excel XLL Add-ins that come from an untrusted source.\n\n        If you enable this policy setting, you can set one of these options:\n        - Block: XLL add-ins from untrusted sources are blocked. Users will receive a notification that the add-in was blocked.\n        - Show Additional Warning: Show an additional warning prompt after the user chooses to enable an XLL add-in from an untrusted source.\n        - Allow: XLL add-ins from an untrusted source are allowed.\n\n        The exceptions when Excel XLL Add-ins will be allowed to run are:\n        - The XLL is stored in a Trusted Location.\n        - The XLL is digitally signed and the matching Trusted Publisher certificate is installed on the device.\n\n        If you disable this policy setting, the settings configured in the Macro and Add-in Settings sections of the Trust Center determine whether Excel XLL Add-ins that come from an untrusted source will be allowed.\n\n        If you disable or do not configure this policy setting, users will be able to override default behavior by modifying the registry.\n\n        For more information, see https://support.microsoft.com/topic/1e3752e2-1177-4444-a807-7b700266a6fb.\n      ","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_BlockXLLFromInternet;L_BlockXLLFromInternetEnum","uniqueId":1282,"displayName":"Block Excel XLL Add-ins that come from an untrusted source","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Show Additional Warning","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"\n        This policy setting allows you to block Excel XLL Add-ins that come from an untrusted source.\n\n        If you enable this policy setting, you can set one of these options:\n        - Block: XLL add-ins from untrusted sources are blocked. Users will receive a notification that the add-in was blocked.\n        - Show Additional Warning: Show an additional warning prompt after the user chooses to enable an XLL add-in from an untrusted source.\n        - Allow: XLL add-ins from an untrusted source are allowed.\n\n        The exceptions when Excel XLL Add-ins will be allowed to run are:\n        - The XLL is stored in a Trusted Location.\n        - The XLL is digitally signed and the matching Trusted Publisher certificate is installed on the device.\n\n        If you disable this policy setting, the settings configured in the Macro and Add-in Settings sections of the Trust Center determine whether Excel XLL Add-ins that come from an untrusted source will be allowed.\n\n        If you disable or do not configure this policy setting, users will be able to override default behavior by modifying the registry.\n\n        For more information, see https://support.microsoft.com/topic/1e3752e2-1177-4444-a807-7b700266a6fb.\n      ","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security","registrySubPath":"blockxllfrominternet","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_ChartRefTrackingEnabled","uniqueId":1519,"displayName":"Allow formatting and labels to track data points","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting governs how custom formatting and data labels react to data changes in a chart.\n\nIf you enable or do not configure this policy setting, when the user creates a new workbook, custom formatting and data labels follow data points as they move or change in any chart in the workbook.\n\nIf you disable this policy setting, custom formatting and data labels do not follow data points, but instead follow data point indices.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"charttrackingrefbased","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Comments","uniqueId":1478,"displayName":"Comments","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Comments;L_comments85","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Determines how comments are displayed on the worksheet.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"fnoteoffv5_35_1","enforcedValues":{}}]}}},{"id":"excel16;L_Comments;L_comments85","uniqueId":1477,"displayName":"Comments","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"None","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Comment indicator only","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Comment & indicator","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Determines how comments are displayed on the worksheet.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"vmdnotedisp_38_2","registryType":"REG_DWORD","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"fnoteoffv5_35_1","enforcedValues":{"none":1,"comment indicator only":0,"comment & indicator":0}}]}}},{"id":"excel16;L_ConfigureCNGCipherChainingMode","uniqueId":1247,"displayName":"Configure CNG cipher chaining mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_ConfigureCNGCipherChainingMode;L_ConfigureCNGCipherChainingModeDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the cipher chaining mode used.\n\nIf you enable this policy setting, the cipher chaining mode specified will be applied.\n\nIf you disable or do not configure this policy setting, Cipher Block Chaining (CBC) will be the default CNG cipher chaining mode used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_ConfigureCNGCipherChainingMode;L_ConfigureCNGCipherChainingModeDropID","uniqueId":1246,"displayName":"Configure CNG cipher chaining mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"ChainingModeCBC","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cipher Block Chaining (CBC)","description":"","tags":[],"dependencyGroup":null},{"value":"ChainingModeCFB","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cipher Feedback (CFB)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"ChainingModeCBC","description":"This policy setting allows you to configure the cipher chaining mode used.\n\nIf you enable this policy setting, the cipher chaining mode specified will be applied.\n\nIf you disable or do not configure this policy setting, Cipher Block Chaining (CBC) will be the default CNG cipher chaining mode used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\crypto","registrySubPath":"cipherchaining","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Cursormovement","uniqueId":1450,"displayName":"Cursor movement","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Cursormovement;L_cursormovement82","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Determines how the insertion point moves through bi-directional text. Possible values are Logical or Visual and the default is Logical.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Cursormovement;L_cursormovement82","uniqueId":1449,"displayName":"Cursor movement","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Logical","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Visual","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Determines how the insertion point moves through bi-directional text. Possible values are Logical or Visual and the default is Logical.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"cursorvisual","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_CutAndCopyObjectsWithCells","uniqueId":1467,"displayName":"Cut and copy objects with cells","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting sets the \"Cut, copy, and sort inserted objects with their parent cells\" option found under File tab | Options | Advanced | Cut, copy, and paste Options.\n\nIf you enable or do not configure this policy setting, Excel will cut, copy, and sort inserted objects with their parent cells.\n\nIf you disable this policy setting, Excel will not cut and copy inserted objects with their parent cells.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"fobjwcellmove_71_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_DBaseIIIANDIVFiles","uniqueId":1327,"displayName":"dBase III / IV files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_DBaseIIIANDIVFiles;L_DBaseIIIANDIVFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_DBaseIIIANDIVFiles;L_DBaseIIIANDIVFilesDropID","uniqueId":1326,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"dbasefiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_DefaultCustomTab","uniqueId":1526,"displayName":"Show custom templates tab by default in Excel on the Office Start screen and in File | New","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether custom templates (when they exist) show as the default tab in Excel on the Office Start screen and in File | New. \n\nIf you enable this policy setting, users will the see custom templates tab as the default tab in Excel on the Office Start screen and in File | New when templates exist (this can include Custom XML programmed templates, templates in the Workgroup templates path, templates in the Personal templates path, or SharePoint templates).\n\nIf you disable or do not configure this policy setting, users will see the Featured templates tab as the default tab in Excel on the Office Start screen and in File | New, unless all Office-provided templates have been disabled.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"officestartdefaulttab","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Defaultdirection","uniqueId":1448,"displayName":"Default sheet direction","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Defaultdirection;L_defaultdirection81","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This setting controls the default sheet direction, which is either \"Left to Right\" or \"Right to Left\".","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Defaultdirection;L_defaultdirection81","uniqueId":1447,"displayName":"Default sheet direction","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Right-to-Left","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Left-to-Right","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This setting controls the default sheet direction, which is either \"Left to Right\" or \"Right to Left\".","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"defaultsheetr2l","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Defaultfilelocation","uniqueId":1211,"displayName":"Default file location","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Defaultfilelocation;L_defaultfilelocation0","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the folder that Excel uses when opening or saving a file.  This setting can be found under File tab | Options | Save | Save workbook Options.\n\nIf you enable this policy setting, you may specify this folder.\n\nIf you disable or do not configure this policy setting, the default folder will be used.","supportedPlatforms":["Windows"],"tags":["Save","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Defaultfilelocation;L_defaultfilelocation0","uniqueId":1210,"displayName":"Default file location","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to specify the folder that Excel uses when opening or saving a file.  This setting can be found under File tab | Options | Save | Save workbook Options.\n\nIf you enable this policy setting, you may specify this folder.\n\nIf you disable or do not configure this policy setting, the default folder will be used.","supportedPlatforms":["Windows"],"tags":["Save","Excel Options","Microsoft Excel 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"defaultpath","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_DefaultSheets","uniqueId":1202,"displayName":"Default Sheets","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_DefaultSheets;L_Sheetsinnewworkbook","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the initial number of worksheets to create in a new workbook.","supportedPlatforms":["Windows"],"tags":["General","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_DefaultSheets;L_Sheetsinnewworkbook","uniqueId":1201,"displayName":"Sheets in new workbook","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":255},"dataType":"Integer"},"description":"Specifies the initial number of worksheets to create in a new workbook.","supportedPlatforms":["Windows"],"tags":["General","Excel Options","Microsoft Excel 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"defsheets","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_DeterminewhethertoforceencryptedExcel","uniqueId":1241,"displayName":"Scan encrypted macros in Excel Open XML workbooks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_DeterminewhethertoforceencryptedExcel;L_DeterminewhethertoforceencryptedExcelDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls whether encrypted macros in Open XML workbooks be are required to be scanned with anti-virus software before being opened.\n\nIf you enable this policy setting, you may choose one of these options:\n\n- Scan encrypted macros: encrypted macros are disabled unless anti-virus software is installed.  Encrypted macros are scanned by your anti-virus software when you attempt to open an encrypted workbook that contains macros.\n- Scan if anti-virus software available: if anti-virus software is installed, scan the encrypted macros first before allowing them to load.  If anti-virus software is not available, allow encrypted macros to load.\n- Load macros without scanning: do not check for anti-virus software and allow macros to be loaded in an encrypted file.\n\nIf you disable or do not configure this policy setting, the behavior will be similar to the \"Scan encrypted macros\" option.","supportedPlatforms":["Windows"],"tags":["Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_DeterminewhethertoforceencryptedExcel;L_DeterminewhethertoforceencryptedExcelDropID","uniqueId":1240,"displayName":"Scan encrypted macros in Excel Open XML workbooks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Scan encrypted macros (default)","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Scan if anti-virus software available","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Load macros without scanning","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls whether encrypted macros in Open XML workbooks be are required to be scanned with anti-virus software before being opened.\n\nIf you enable this policy setting, you may choose one of these options:\n\n- Scan encrypted macros: encrypted macros are disabled unless anti-virus software is installed.  Encrypted macros are scanned by your anti-virus software when you attempt to open an encrypted workbook that contains macros.\n- Scan if anti-virus software available: if anti-virus software is installed, scan the encrypted macros first before allowing them to load.  If anti-virus software is not available, allow encrypted macros to load.\n- Load macros without scanning: do not check for anti-virus software and allow macros to be loaded in an encrypted file.\n\nIf you disable or do not configure this policy setting, the behavior will be similar to the \"Scan encrypted macros\" option.","supportedPlatforms":["Windows"],"tags":["Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security","registrySubPath":"excelbypassencryptedmacroscan","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_DifAndSylkFiles","uniqueId":1337,"displayName":"Dif and Sylk files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_DifAndSylkFiles;L_DifAndSylkFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_DifAndSylkFiles;L_DifAndSylkFilesDropID","uniqueId":1336,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"difandsylkfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Disableallapplicationextensions","uniqueId":1277,"displayName":"Disable all application add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting disables all add-ins for the specified Office 2016 applications.\n      \nIf you enable this policy setting, all add-ins for the specified Office 2016 applications are disabled.\n\nIf you disable or do not configure this policy setting, all add-ins for the specified Office 2016 applications are allowed to run without notifying the users, except if application add-ins are required to be signed by Trusted Publishers.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security","registrySubPath":"disablealladdins","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_DisableAutoRepublish","uniqueId":1222,"displayName":"Disable AutoRepublish","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting allows administrators to disable the AutoRepublish feature in Excel. If users choose to publish Excel data to a static Web page and enable the AutoRepublish feature, Excel saves a copy of the data to the Web page every time the user saves the workbook. By default, a message dialog displays every time the user saves a published workbook when AutoRepublish is enabled. From this dialog, the user can disable AutoRepublish temporarily or permanently, or select \"Do not show this message again\" to prevent the dialog from appearing after every save. If the user selects \"Do not show this message again\", Excel will continue to automatically republish the data after every save without informing the user.\n      \n      If you enable this policy setting, the AutoRepublish feature is turned off and Excel users will need to publish data to the Web manually.\n      \n      If you disable or do not configure this policy setting, users can enable the AutoRepublish feature to automatically republish workbooks saved as type Web Page.","supportedPlatforms":["Windows"],"tags":["Save","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"disableautorepublish","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_disablecommandbarbuttonsandmenuitems165","uniqueId":1505,"displayName":"Disable commands","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_disablecommandbarbuttonsandmenuitems165;L_EnteracommandbarIDtodisable","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable any command bar button and menu item with a command bar ID, including command bar buttons and menu items that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item. The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, all default command bar buttons or menu items are available to users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_disablecommandbarbuttonsandmenuitems165;L_EnteracommandbarIDtodisable","uniqueId":1504,"displayName":"Enter a command bar ID to disable","settingType":{"possibleValues":{"possibleValuesType":"List","ValueType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to disable any command bar button and menu item with a command bar ID, including command bar buttons and menu items that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item. The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, all default command bar buttons or menu items are available to users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledcmdbaritemslist","registryPath":"TCID","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_DeveloperCodeMacros","uniqueId":1493,"displayName":"Developer tab | Code | Macros","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"186","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications.\n      \n      If you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting.\n      \n      If you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacromacros","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_DeveloperCodemacroSecurity","uniqueId":1495,"displayName":"Developer tab | Code | Macro Security","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"3627","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications.\n      \n      If you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting.\n      \n      If you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacrosecurity","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_DeveloperCodeRecordMacro","uniqueId":1494,"displayName":"Developer tab | Code | Record Macro","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"184","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications.\n      \n      If you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting.\n      \n      If you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacrorecord","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_DeveloperCodeVisualbasic","uniqueId":1496,"displayName":"Developer tab | Code | Visual Basic","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1695","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications.\n      \n      If you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting.\n      \n      If you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacrovbe","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Disablecommandbarbuttonsandmenuitems","uniqueId":1498,"displayName":"Disable predefined commands","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_OfficeButtonxcelOptionsCustomizationCombinedPreviewWebPagePreview","logicalOperator":"exists","values":null},{"dependee":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_OfficeButtonExcelOptionsCustomizationMailRecipient","logicalOperator":"exists","values":null},{"dependee":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_InsertLinksHyperlink","logicalOperator":"exists","values":null},{"dependee":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_ReviewChangesProtectSheet","logicalOperator":"exists","values":null},{"dependee":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_ReviewChangesProtectWorkbook","logicalOperator":"exists","values":null},{"dependee":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_ReviewChangesProtectSharing","logicalOperator":"exists","values":null},{"dependee":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_ViewMacrosMacros","logicalOperator":"exists","values":null},{"dependee":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_DeveloperCodeMacros","logicalOperator":"exists","values":null},{"dependee":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_DeveloperCodeRecordMacro","logicalOperator":"exists","values":null},{"dependee":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_DeveloperCodemacroSecurity","logicalOperator":"exists","values":null},{"dependee":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_DeveloperCodeVisualbasic","logicalOperator":"exists","values":null},{"dependee":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_OfficeButtonExcelOptionsCustomizeDocumentLocation","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications.\n      \n      If you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting.\n      \n      If you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledcmdbaritemscheckboxes","registrySubPath":"filepublishaswebpage","enforcedValues":{}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledcmdbaritemscheckboxes","registrySubPath":"weboptions","enforcedValues":{}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledcmdbaritemscheckboxes","registrySubPath":"generaloptions","enforcedValues":{}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledcmdbaritemscheckboxes","registrySubPath":"fileopensearchtheweb","enforcedValues":{}}]}}},{"id":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_InsertLinksHyperlink","uniqueId":1488,"displayName":"Insert tab | Links | Hyperlink","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1576","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications.\n      \n      If you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting.\n      \n      If you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledcmdbaritemscheckboxes","registrySubPath":"inserthyperlink","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_OfficeButtonExcelOptionsCustomizationMailRecipient","uniqueId":1487,"displayName":"File tab | Share | Email","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"2188","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications.\n      \n      If you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting.\n      \n      If you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledcmdbaritemscheckboxes","registrySubPath":"sendtomailrecipient","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_OfficeButtonExcelOptionsCustomizeDocumentLocation","uniqueId":1497,"displayName":"File tab | Options | Customize Ribbon | All Commands | Document Location","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1740","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications.\n      \n      If you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting.\n      \n      If you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledcmdbaritemscheckboxes","registrySubPath":"webaddress","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_OfficeButtonxcelOptionsCustomizationCombinedPreviewWebPagePreview","uniqueId":1486,"displayName":"File tab | Options | Customize Ribbon | All Commands | Web Page Preview","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"3655","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications.\n      \n      If you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting.\n      \n      If you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledcmdbaritemscheckboxes","registrySubPath":"filewebpagepreview","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_ReviewChangesProtectSharing","uniqueId":1491,"displayName":"Review tab | Changes | Protect and Share Workbook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"3059","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications.\n      \n      If you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting.\n      \n      If you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsprotectshare","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_ReviewChangesProtectSheet","uniqueId":1489,"displayName":"Review tab | Changes | Protect Sheet","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"893","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications.\n      \n      If you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting.\n      \n      If you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsprotectsheet","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_ReviewChangesProtectWorkbook","uniqueId":1490,"displayName":"Review tab | Changes | Protect Workbook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"16132","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications.\n      \n      If you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting.\n      \n      If you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledcmdbaritemscheckboxes","registrySubPath":"flyoutanchorprotectworkbookmenu","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Disablecommandbarbuttonsandmenuitems;L_ViewMacrosMacros","uniqueId":1492,"displayName":"View tab | Macros | Macros","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"16106","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications.\n      \n      If you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting.\n      \n      If you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledcmdbaritemscheckboxes","registrySubPath":"flyoutanchormacros","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_DisableDDEServerLaunch","uniqueId":1235,"displayName":"Don’t allow Dynamic Data Exchange (DDE) server launch in Excel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting allows you to control whether Dynamic Data Exchange (DDE) server launch is allowed.\n\nBy default, DDE server launch is turned off, but users can turn on DDE server launch by going to File > Options > Trust Center > Trust Center Settings > External Content.\n\nFor security reasons, turning on DDE server launch is not recommended.\n\nNote: For DDE server launch to work, Dynamic Data Exchange (DDE) server lookup must be turned on. Be sure that the “Don’t allow Dynamic Data Exchange (DDE) server lookup” policy setting isn’t enabled, because enabling that policy setting turns off DDE server lookup.\n\nIf you enable this policy setting, DDE server launch isn’t allowed, and users can’t turn on DDE server launch in the Trust Center.\n\nIf you disable this policy setting, DDE server launch is allowed, and users cannot turn off DDE server launch in the Trust Center. For security reasons, this is not recommended.\n\nIf you don’t configure this policy setting, DDE server launch is turned off, but users can turn on DDE server launch in the Trust Center.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["External Content","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\external content","registrySubPath":"disableddeserverlaunch","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_DisableDDEServerLookup","uniqueId":1234,"displayName":"Don’t allow Dynamic Data Exchange (DDE) server lookup in Excel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting allows you to control whether Dynamic Data Exchange (DDE) server lookup is allowed.\n\nBy default, DDE server lookup is turned on, but users can turn off DDE server lookup by going to File > Options > Trust Center > Trust Center Settings > External Content.\n\nIf you enable this policy setting, DDE server lookup isn’t allowed, and users can’t turn on DDE server lookup in the Trust Center.\n\nNote: If you’re using Dynamic Data Exchange (DDE) server launch, which isn’t recommended, don’t enable this policy setting, because DDE server launch requires DDE server lookup to be on.\n\nIf you disable or don’t configure this policy setting, DDE server lookup is turned on, but users can turn off DDE server lookup in the Trust Center.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["External Content","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\external content","registrySubPath":"disableddeserverlookup","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_DisableFromPowerBIDatasetOrganizationName","uniqueId":1528,"displayName":"Disable displaying organization name in the buttons to create PivotTables from Power BI datasets","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\n        This policy setting allows you to prevent the organization name from being displayed in the buttons in the Excel ribbon used to create PivotTables from Power BI datasets.  By default, the organization name will be shown in the ribbon if it is available from Graph.\n\n        If you enable this policy setting, the organization name will not be shown.\n\n        If you disable or don’t configure this policy setting, the organization name will be shown.\n\n        Note: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Power BI","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\power bi","registrySubPath":"disablefrompowerbidatasetorganizationname","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_DisableLivePreview","uniqueId":1199,"displayName":"Enable Live Preview","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Shows or hides the Live Previews that appear when using Galleries that support previews.  Live Preview shows how a command would be applied without actually applying it to the document.","supportedPlatforms":["Windows"],"tags":["General","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"livepreview","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_DisableOfficeStartExcel","uniqueId":1523,"displayName":"Disable the Office Start screen for Excel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the Office Start screen appears on boot for Excel.\n\nIf you enable this policy setting, users will not see the Office Start screen when they boot Excel.\n\nIf you disable or do not configure this policy setting, users will see the Office Start screen when they boot Excel.\n\nNote: This policy setting is overridden by the policy setting \"Microsoft Office 2016 > Miscellaneous > Disable the Office Start screen for all Office applications\" if that policy setting is set.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"disableboottoofficestart","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_disableshortcutkeys166","uniqueId":1507,"displayName":"Disable shortcut keys","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_disableshortcutkeys166;L_Enterakeyandmodifiertodisable","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable any shortcut key by using its virtual key code ID, including shortcut keys that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter a virtual key code ID number to disable a specific shortcut key.\n\nIf you disable or do not configure this policy setting, all default shortcut keys are enabled for users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_disableshortcutkeys166;L_Enterakeyandmodifiertodisable","uniqueId":1506,"displayName":"Enter a key and modifier to disable","settingType":{"possibleValues":{"possibleValuesType":"List","ValueType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to disable any shortcut key by using its virtual key code ID, including shortcut keys that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter a virtual key code ID number to disable a specific shortcut key.\n\nIf you disable or do not configure this policy setting, all default shortcut keys are enabled for users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledshortcutkeyslist","registryPath":"KeyMod","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Disableshortcutkeys;L_AltF8ToolsMacroMacros","uniqueId":1501,"displayName":"Alt+F8 (Developer | Code | Macros)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"119,16","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific shortcut key combinations in the specified applications.\n      \n      If you enable this policy setting you can disable specific shortcut keys for the selected application.  The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting.\n      \n      If you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledshortcutkeyscheckboxes","registrySubPath":"toolsmacromacros","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Disableshortcutkeys;L_AltLVDeveloperCodeVisualBasic","uniqueId":1502,"displayName":"Alt+F11 (Developer | Code | Visual Basic)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"122,16","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific shortcut key combinations in the specified applications.\n      \n      If you enable this policy setting you can disable specific shortcut keys for the selected application.  The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting.\n      \n      If you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledshortcutkeyscheckboxes","registrySubPath":"toolsmacrovbe","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Disableshortcutkeys;L_CtrlFHomeEditingFind","uniqueId":1499,"displayName":"Ctrl+F (Home | Editing | Find & Select | Find)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"70,8","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific shortcut key combinations in the specified applications.\n      \n      If you enable this policy setting you can disable specific shortcut keys for the selected application.  The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting.\n      \n      If you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledshortcutkeyscheckboxes","registrySubPath":"find","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Disableshortcutkeys;L_CtrlKInsertLinksHyperlinks","uniqueId":1500,"displayName":"Ctrl+K (Insert | Links |  Hyperlink)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"75,8","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific shortcut key combinations in the specified applications.\n      \n      If you enable this policy setting you can disable specific shortcut keys for the selected application.  The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting.\n      \n      If you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\disabledshortcutkeyscheckboxes","registrySubPath":"inserthyperlink","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Disableshortcutkeys","uniqueId":1503,"displayName":"Disable shortcut keys","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Disableshortcutkeys;L_CtrlFHomeEditingFind","logicalOperator":"exists","values":null},{"dependee":"excel16;L_Disableshortcutkeys;L_CtrlKInsertLinksHyperlinks","logicalOperator":"exists","values":null},{"dependee":"excel16;L_Disableshortcutkeys;L_AltF8ToolsMacroMacros","logicalOperator":"exists","values":null},{"dependee":"excel16;L_Disableshortcutkeys;L_AltLVDeveloperCodeVisualBasic","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable specific shortcut key combinations in the specified applications.\n      \n      If you enable this policy setting you can disable specific shortcut keys for the selected application.  The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting.\n      \n      If you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_DisableTrustBarNotificationforunsigned","uniqueId":1279,"displayName":"Disable Trust Bar Notification for unsigned application add-ins and block them","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting controls whether the specified Office 2016 applications notify users when unsigned application add-ins are loaded or silently disable such add-ins without notification. This policy setting only applies if you enable the ''Require that application add-ins are signed by Trusted Publisher'' policy setting, which prevents users from changing this policy setting.       \nIf you enable this policy setting, applications automatically disable unsigned add-ins without informing users.\n \nIf you disable this policy setting, if an application is configured to require that all add-ins be signed by a trusted publisher, any unsigned add-ins the application loads will be disabled and the application will display the Trust Bar at the top of the active window. The Trust Bar contains a message that informs users about the unsigned add-in.\n\nIf you do not configure this policy setting, the disable behavior applies, and in addition, users can configure this requirement themselves in the ''Add-ins'' category of the Trust Center for the application.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security","registrySubPath":"notbpromptunsignedaddin","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_DisableTrustedLoc","uniqueId":1344,"displayName":"Disable all trusted locations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows administrators to disable all trusted locations in the specified applications. Trusted locations specified in the Trust Center are used to define file locations that are assumed to be safe. Content, code, and add-ins are allowed to load from trusted locations with a minimal amount of security, without prompting the users for permission. If a dangerous file is opened from a trusted location, it will not be subject to standard security measures and could harm users' computers or data.\n      \nIf you enable this policy setting, all trusted locations (those specified in the Trust Center) in the specified applications are ignored, including any trusted locations established by Office 2016 during setup, deployed to users using Group Policy, or added by users themselves.  Users will be prompted again when opening files from trusted locations.\n\nIf you disable or do not configure this policy setting, all trusted locations (those specified in the Trust Center) in the specified applications are assumed to be safe.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations","registrySubPath":"alllocationsdisabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_DisplayDeveloperTab","uniqueId":1198,"displayName":"Display Developer tab in the Ribbon","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the Developer tab will be displayed in the Ribbon.\n\nIf you enable this policy setting, the Developer tab will be displayed in the Ribbon.\n\nIf you disable this policy setting, the Developer tab will not be displayed in the Ribbon.\n\nIf you do not configure this policy setting, the Developer tab will not be displayed in the Ribbon, but its visibility can be changed via a setting in the application Options dialog box.","supportedPlatforms":["Windows"],"tags":["Customize Ribbon","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"developertools","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_DoNotCacheNetworkFilesLocally","uniqueId":1512,"displayName":"Do not cache network files locally","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to configure whether network files are locally cached when editing spreadsheets stored on network shares.\n\nIf you enable this policy setting, a file located on a network share may not be saved if the network connection was lost at any time while editing the file and the file contains a pivot table, VBE code or an embedded OLE object. \n\nIf you disable or do not configure this policy setting, network files are locally cached when editing spreadsheets stored on network shares.  This may help prevent data loss during network failures.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"networkresiliency","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_DoNotOpenFilesFromTheInternetZoneInProtectedView","uniqueId":1229,"displayName":"Do not open files from the internet zone in Protected View","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting allows you to determine if files downloaded from the internet zone open in Protected View.\n\nIf you enable this policy setting, files downloaded from the internet zone do not open in Protected View.\n\nIf you disable or do not configure this policy setting, files downloaded from the internet zone open in Protected View.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\protectedview","registrySubPath":"disableinternetfilesinpv","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_DoNotOpenFilesInUnsafeLocationsInProtectedView","uniqueId":1228,"displayName":"Do not open files in unsafe locations in Protected View","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting lets you determine if files located in unsafe locations will open in Protected View.  If you have not specified unsafe locations, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders are considered unsafe locations.\n\nIf you enable this policy setting, files located in unsafe locations do not open in Protected View.\n\nIf you disable or do not configure this policy setting, files located in unsafe locations open in Protected View.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\protectedview","registrySubPath":"disableunsafelocationsinpv","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_DoNotShowAutoRepublishWarningAlert","uniqueId":1223,"displayName":"Do not show AutoRepublish warning alert","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting controls whether Excel displays an alert before republishing a workbook to the World Wide Web.\n\nIf you enable this policy setting, no warning appears when the user saves a published workbook when AutoRepublish is enabled.\n      \nIf you disable or do not configure this policy setting, a message dialog appears every time the user saves a published workbook when AutoRepublish is enabled. From this dialog, the user can disable AutoRepublish temporarily or permanently, or select \"Do not show this message again\" to prevent the dialog from appearing after every save. If the user selects \"Do not show this message again\", Excel will continue to automatically republish the data after every save without informing the user.","supportedPlatforms":["Windows"],"tags":["Save","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"disableautorepublishwarning","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Donotshowdataextractionoptionswhenopeningcorruptworkbooks","uniqueId":1485,"displayName":"Do not show data extraction options when opening corrupt workbooks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting controls whether Excel presents users with a list of data extraction options before beginning an Open and Repair operation when users choose to open a corrupt workbook in repair or extract mode.\n      \nIf you enable this policy setting, Excel opens the file using the Safe Load process and does not prompt users to choose between repairing or extracting data.\n      \nIf you disable or do not configure this policy setting, Excel prompts the user to select either to repair or to extract data, and to select either to convert to values or to recover formulas.","supportedPlatforms":["Windows"],"tags":["Data Recovery","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"extractdatadisableui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Editdirectlyincell","uniqueId":1460,"displayName":"Edit directly in cell","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting sets the \"Edit directly in cell\" option found under File tab | Options | Advanced | Editing Options.\n\nIf you enable or do not configure this policy setting, Excel will allow editing directly in the cell  This is the default behavior.\n\nIf you disable this policy setting, Excel will not allow editing to be done directly in the cell.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"fnoincell_66_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_EnableAutoCompleteforcellvalues","uniqueId":1469,"displayName":"Enable AutoComplete for cell values","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting sets the \"Enable AutoComplete for cell values\" option found under File tab | Options | Advanced | Editing Options.\n\nIf you enable or do not configure this policy setting, Excel will allow AutoComplete for cell values. This is the default behavior.\n\nIf you disable this policy setting, Excel will turn off the AutoComplete feature.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"fautocomplete_128_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Enableautomaticpercententry","uniqueId":1471,"displayName":"Enable automatic percent entry","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Enabling this policy selects the Advanced (Editing options) user option to \"Enable automatic percent entry\".","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"fdisableautopercent_99_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_EnableBlockUnsecureQueryFiles","uniqueId":1236,"displayName":"Always prevent untrusted Microsoft Query files from opening","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting controls whether Microsoft Query files (.iqy, oqy, .dqy, and .rqy) in an untrusted location are prevented from opening.\n\nIf you enable this policy setting, Microsoft Query files in an untrusted location are prevented from opening. Users will not be able to change this setting under File > Options > Trust Center > Trust Center Settings > External Content.\n\nIf you disable or don’t configure this policy setting, Microsoft Query files in an untrusted location are not prevented from opening, unless users have changed this setting in the Trust Center.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["External Content","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\external content","registrySubPath":"enableblockunsecurequeryfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_EnableDataBaseFileProtectedView","uniqueId":1238,"displayName":"Always open untrusted database files in Protected View","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting controls whether database files (.dbf) opened from an untrusted location are always opened in Protected View.\n\nIf you enable this policy setting, database files opened from an untrusted location are always opened in Protected View. Users will not be able to change this setting under File > Options > Trust Center > Trust Center Settings > Protected View.\n\nIf you disable or don’t configure this policy setting, database files opened from an untrusted location are not opened in Protected View, unless users have changed this setting in the Trust Center.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\protectedview","registrySubPath":"enabledatabasefileprotectedview","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_EnableFillHandleAndCellDragAndDrop","uniqueId":1461,"displayName":"Enable fill handle and cell drag-and-drop","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting sets the \"Enable fill handle and cell drag-and-drop\" option found under File tab | Options | Advanced | Editing Options.\n\nIf you enable or do not configure this policy setting, Excel will enable the fill handle and allow drag-and-drop.  This is the default behavior.\n\nIf you disable this policy setting, Excel will disable the fill handle and drag-and-drop will not be allowed.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"fdisabledman_36_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_EnableForeignTextFileProtectedView","uniqueId":1237,"displayName":"Always open untrusted text-based files in Protected View","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether text-based files (.csv, .dif, and .sylk) opened from an untrusted location are always opened in Protected View.\n\nIf you enable this policy setting, text-based files opened from an untrusted location are always opened in Protected View. Users will not be able to change this setting under File > Options > Trust Center > Trust Center Settings > Protected View.\n\nIf you disable or don’t configure this policy setting, text-based files opened from an untrusted location are not opened in Protected View, unless users have changed this setting in the Trust Center.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\protectedview","registrySubPath":"enableforeigntextfileprotectedview","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Enablefourdigityeardisplay","uniqueId":1511,"displayName":"Enable four-digit year display","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"When this setting is not enabled, Excel follows the Short date style setting under Regional Settings in Control Panel. When this setting is enabled, Excel always displays four digits when you type a date that includes a four-digit year, which may override the Short date style setting under Regional Settings in Control Panel.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"enablefourdigityeardisplay","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Excel2007AndLaterAddInFiles","uniqueId":1291,"displayName":"Excel 2007 and later add-in files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Excel2007AndLaterAddInFiles;L_Excel2007AndLaterAddInFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Excel2007AndLaterAddInFiles;L_Excel2007AndLaterAddInFilesDropID","uniqueId":1290,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"xlamfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Excel2007AndLaterBinaryWorkbooks","uniqueId":1293,"displayName":"Excel 2007 and later binary workbooks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Excel2007AndLaterBinaryWorkbooks;L_Excel2007AndLaterBinaryWorkbooksDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Excel2007AndLaterBinaryWorkbooks;L_Excel2007AndLaterBinaryWorkbooksDropID","uniqueId":1292,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"xlsbfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Excel2007AndLaterMacroEnabledWorkbooksAndTemplates","uniqueId":1289,"displayName":"Excel 2007 and later macro-enabled workbooks and templates","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Excel2007AndLaterMacroEnabledWorkbooksAndTemplates;L_Excel2007AndLaterMacroEnabledWorkbooksAndTemplatesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Excel2007AndLaterMacroEnabledWorkbooksAndTemplates;L_Excel2007AndLaterMacroEnabledWorkbooksAndTemplatesDropID","uniqueId":1288,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"xlsmandxltmfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Excel2007AndLaterWorkbooksandTemplates","uniqueId":1287,"displayName":"Excel 2007 and later workbooks and templates","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Excel2007AndLaterWorkbooksandTemplates;L_Excel2007AndLaterWorkbooksandTemplatesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Excel2007AndLaterWorkbooksandTemplates;L_Excel2007AndLaterWorkbooksandTemplatesDropID","uniqueId":1286,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"xlsxandxltxfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Excel2MacrosheetsAndAddInFiles","uniqueId":1317,"displayName":"Excel 2 macrosheets and add-in files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Excel2MacrosheetsAndAddInFiles;L_Excel2MacrosheetsAndAddInFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Excel2MacrosheetsAndAddInFiles;L_Excel2MacrosheetsAndAddInFilesDropID","uniqueId":1316,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"xl2macros","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Excel2Worksheets","uniqueId":1311,"displayName":"Excel 2 worksheets","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Excel2Worksheets;L_Excel2WorksheetsDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Excel2Worksheets;L_Excel2WorksheetsDropID","uniqueId":1310,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"xl2worksheets","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Excel3MacrosheetsAndAddInFiles","uniqueId":1315,"displayName":"Excel 3 macrosheets and add-in files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Excel3MacrosheetsAndAddInFiles;L_Excel3MacrosheetsAndAddInFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Excel3MacrosheetsAndAddInFiles;L_Excel3MacrosheetsAndAddInFilesDropID","uniqueId":1314,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"xl3macros","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Excel3Worksheets","uniqueId":1309,"displayName":"Excel 3 worksheets","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Excel3Worksheets;L_Excel3WorksheetsDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Excel3Worksheets;L_Excel3WorksheetsDropID","uniqueId":1308,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"xl3worksheets","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Excel4MacrosheetsAndAddInFiles","uniqueId":1313,"displayName":"Excel 4 macrosheets and add-in files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Excel4MacrosheetsAndAddInFiles;L_Excel4MacrosheetsAndAddInFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Excel4MacrosheetsAndAddInFiles;L_Excel4MacrosheetsAndAddInFilesDropID","uniqueId":1312,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"xl4macros","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Excel4Workbooks","uniqueId":1305,"displayName":"Excel 4 workbooks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Excel4Workbooks;L_Excel4WorkbooksDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Excel4Workbooks;L_Excel4WorkbooksDropID","uniqueId":1304,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"xl4workbooks","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Excel4Worksheets","uniqueId":1307,"displayName":"Excel 4 worksheets","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Excel4Worksheets;L_Excel4WorksheetsDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Excel4Worksheets;L_Excel4WorksheetsDropID","uniqueId":1306,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"xl4worksheets","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Excel9597WorkbooksAndTemplates","uniqueId":1301,"displayName":"Excel 95-97 workbooks and templates","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Excel9597WorkbooksAndTemplates;L_Excel9597WorkbooksAndTemplatesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Excel9597WorkbooksAndTemplates;L_Excel9597WorkbooksAndTemplatesDropID","uniqueId":1300,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"xl9597workbooksandtemplates","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Excel95Workbooks","uniqueId":1303,"displayName":"Excel 95 workbooks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Excel95Workbooks;L_Excel95WorkbooksDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Excel95Workbooks;L_Excel95WorkbooksDropID","uniqueId":1302,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"xl95workbooks","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Excel972003AddInFiles","uniqueId":1297,"displayName":"Excel 97-2003 add-in files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Excel972003AddInFiles;L_Excel972003AddInFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Excel972003AddInFiles;L_Excel972003AddInFilesDropID","uniqueId":1296,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"xl97addins","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Excel972003WorkbooksAndTemplates","uniqueId":1299,"displayName":"Excel 97-2003 workbooks and templates","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Excel972003WorkbooksAndTemplates;L_Excel972003WorkbooksAndTemplatesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Excel972003WorkbooksAndTemplates;L_Excel972003WorkbooksAndTemplatesDropID","uniqueId":1298,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"xl97workbooksandtemplates","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_ExcelAddInFiles","uniqueId":1325,"displayName":"Excel add-in files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_ExcelAddInFiles;L_ExcelAddInFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_ExcelAddInFiles;L_ExcelAddInFilesDropID","uniqueId":1324,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"xllfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_ExcelDisableOfficeScripts","uniqueId":1529,"displayName":"Disable Office Scripts in Excel for Windows Desktop","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Office Scripts (including the relevant commands on the Automate tab) are available for use.\n\nIf you enable this policy setting, Office Scripts will not be available for use on the installed Excel app on a desktop.\n\nIf you disable or don't configure this policy setting, Office Scripts will be available for use provided all other prerequisites are met, including the applicable Microsoft 365 subscription license.\n\nNote: This policy setting is independent of Office Scripts settings available to administrators in the Microsoft 365 Admin Center. Admin Center settings are always honored by the Excel app regardless of the state of this policy; however, turning on this policy will also hide Office Scripts-related entry points.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"disableofficescripts","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_ExcelFileBlockExternalLinks","uniqueId":1342,"displayName":"File Block includes external link files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This setting determines whether Trust Center settings for blocking load of potentially unsecure workbooks applies to those accessed by external links.\n\nIf you enable this policy setting, external links to workbooks that are blocked by File Block settings in Trust Center will not refresh. Attempts to create new links or refresh data from blocked workbooks may result in errors.\n\nIf you disable this policy setting, attempts to access external links data will not be subject to File Block settings in Trust Center.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"fileblockexternallinks","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_ExcelForceSupportForUnicodeSurrogates","uniqueId":1530,"displayName":"Force support for Unicode surrogates in Excel 2021 and Excel 2024","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Warning: this setting alters how your app calculates LEN, MID, SEARCH, FIND and REPLACE and forces files to Compatibility Version 2. When these workbooks are shared, users may see different calculation results. This setting only applies to non-subscription Excel 2021 and Excel 2024.\n \nIf you enable this policy setting, when any workbook is opened in non-subscription Excel 2021 or Excel 2024, it will automatically be set to Compatibility Version 2. This will cause LEN, MID, SEARCH, FIND and REPLACE functions to calculate differently in those workbooks.\n \nIf you disable or do not configure this policy setting, the Compatibility Version will not be automatically set when a file is opened in any version of non-subscription Excel 2021 and Excel 2024 (this setting never affects other versions).","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"forcesupportforunicodesurrogates","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_ExtendDataRangeFormatsAndFormulas","uniqueId":1470,"displayName":"Extend data range formats and formulas","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting sets the \"Extend data range formats and formulas\" option found under File tab | Options | Advanced | Editing Options.\n\nIf you enable or do not configure this policy setting, Excel will allow the user to automatically format new items added to the end of a list to match the format of the rest of the list. This is the default behavior.\n\nIf you disable this policy setting, Excel will not automatically format new items added to the end of a list.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"extendlist","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Font","uniqueId":1204,"displayName":"Default Font","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Font;L_NameSize","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls the default font for Excel.\n\nIf you enable this policy setting, you can set the default font for Excel by specifing the font name and size seperated with a comma.\n\nExample: Arial, 10\n\nIf you disable or you do not configure this policy setting, Excel will use the default specified by the user.","supportedPlatforms":["Windows"],"tags":["General","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Font;L_NameSize","uniqueId":1203,"displayName":"Name, Size","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting controls the default font for Excel.\n\nIf you enable this policy setting, you can set the default font for Excel by specifing the font name and size seperated with a comma.\n\nExample: Arial, 10\n\nIf you disable or you do not configure this policy setting, Excel will use the default specified by the user.","supportedPlatforms":["Windows"],"tags":["General","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"font","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Forcefileextenstionstomatch;L_Empty","uniqueId":1242,"displayName":"Force file extension to match file type","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow different","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow different, but warn","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Always match file type","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":1,"description":"This policy setting controls how Excel loads file types that do not match their extension. Excel can load files with extensions that do not match the files' type. For example, if a comma-separated values (CSV) file named example.csv is renamed example.xls (or any other file extension supported by Excel 2003 and earlier only), Excel can properly load it as a CSV file.\n\nIf you enable this policy setting, you can choose from three options for working with files that have non-matching extensions:\n\n-  Allow different -  Excel opens the files properly without warning users that the files have non-matching extensions. If users subsequently edit and save the files, Excel preserves both the true, underlying file format and the incorrect file extension.\n\n-  Allow different, but warn - Excel opens the files properly, but warns users about the file type mismatch. This option is the default configuration in Excel.\n\n-  Always match file type -  Excel does not open any files that have non-matching extensions.\n\nIf you disable or do not configure this policy setting, if users attempt to open files with the wrong extension, Excel opens the file and displays a warning that the file type is not what Excel expected.","supportedPlatforms":["Windows"],"tags":["Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security","registrySubPath":"extensionhardening","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Forcefileextenstionstomatch","uniqueId":1243,"displayName":"Force file extension to match file type","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Forcefileextenstionstomatch;L_Empty","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls how Excel loads file types that do not match their extension. Excel can load files with extensions that do not match the files' type. For example, if a comma-separated values (CSV) file named example.csv is renamed example.xls (or any other file extension supported by Excel 2003 and earlier only), Excel can properly load it as a CSV file.\n\nIf you enable this policy setting, you can choose from three options for working with files that have non-matching extensions:\n\n-  Allow different -  Excel opens the files properly without warning users that the files have non-matching extensions. If users subsequently edit and save the files, Excel preserves both the true, underlying file format and the incorrect file extension.\n\n-  Allow different, but warn - Excel opens the files properly, but warns users about the file type mismatch. This option is the default configuration in Excel.\n\n-  Always match file type -  Excel does not open any files that have non-matching extensions.\n\nIf you disable or do not configure this policy setting, if users attempt to open files with the wrong extension, Excel opens the file and displays a warning that the file type is not what Excel expected.","supportedPlatforms":["Windows"],"tags":["Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Functiontooltips","uniqueId":1476,"displayName":"Function tooltips","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Enabling this setting selects the Advanced (Display) user option to \"Show function ScreenTips\".","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"fshowfuntips_101_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Graphgallerypath","uniqueId":1510,"displayName":"Graph gallery path","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Graphgallerypath;L_Graphgallerypath169","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the path where user defined graph templates are stored.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_Graphgallerypath;L_Graphgallerypath169","uniqueId":1509,"displayName":"Graph gallery path","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Sets the path where user defined graph templates are stored.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\graph\\options","registrySubPath":"gallerypath","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Ignoreotherapplications","uniqueId":1456,"displayName":"Ignore other applications","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Excel can exchange data with other applications that use Dynamic Data Exchange (DDE).\n      \n      If you enable this policy setting, Excel does not allow the exchange of data with other applications that use DDE.  In addition, the \"Ignore other applications that use Dynamic Data Exchange (DDE)\" user interface option under Excel Options | General is selected and users cannot change it. Enabling this policy setting can cause disruptions for users who rely on the DDE functionality in Excel to update information in workbooks. These users will have to use some other method to update information provided by other applications.\n      \n      If you disable or do not configure this policy setting, Excel can use the Dynamic Data Exchange (DDE) protocol to exchange messages and data with other applications. For example, a cell in an Excel workbook can be dynamically linked to a value provided by another application, such as weather or stock price information. When the value provided by the other application changes, Excel can automatically update the value in the workbook. Note: users can change this behavior by selecting the \"Ignore other applications that use Dynamic Data Exchange (DDE)\" user interface option under Excel Options | General.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"fddeenabled_6_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Includenewrowsandcolumnsinlist","uniqueId":1207,"displayName":"Include new rows and columns in table","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"When working in cells adjacent to a table (known as a \"list\" in previous versions of Excel), enabling this setting causes the adjacent row or column to become part of the table.","supportedPlatforms":["Windows"],"tags":["Autocorrect Options","Proofing","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"autoexpandlistrange","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Internetandnetworkpathsashyperlinks","uniqueId":1208,"displayName":"Internet and network paths as hyperlinks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether Excel automatically creates hyperlinks when users enter URL or UNC path information.\n      \nIf you enable this policy setting, when users type a string of characters that Excel recognizes as a Uniform Resource Locator (URL) or Uniform Naming Convention (UNC) path to a resource on the internet or a local network, Excel will automatically transform it into a hyperlink. Clicking the hyperlink opens it in the configured default Web browser or the appropriate application.\n      \nIf you disable this policy setting, Excel will not transform URLs and UNC paths to hyperlinks.\n      \nIf you do not configure this policy setting,  Excel will automatically transform URLs and UNC paths to hyperlinks and users can change the behavior by selecting or deselecting the \"Internet and network paths as hyperlinks\" check box under File tab | Help | Options | Proofing | AutoCorrect Options... | AutoFormat as You Type tab | Replace as you type.","supportedPlatforms":["Windows"],"tags":["Autocorrect Options","Proofing","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"autohyperlink","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_KeepLastAutoSavedVersions","uniqueId":1209,"displayName":"Keep the last AutoSaved versions of files for the next session","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether Excel keeps the last AutoSaved version of a file if a user closes a file without saving it.  (Note: AutoSave applies only when AutoRecover is enabled.)\n\nIf you enable or do not configure this policy setting, Excel keeps the last AutoSaved version of the file and makes it available to the user the next time the file is opened if the user closes a file without saving it.\n\nIf you disable this policy setting, Excel does not keep the last AutoSaved version of the file if the user closes a file without saving it.","supportedPlatforms":["Windows"],"tags":["Save","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"keepunsavedchanges","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_LegacyConvertersForExcel","uniqueId":1339,"displayName":"Legacy converters for Excel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_LegacyConvertersForExcel;L_LegacyConvertersForExcelDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_LegacyConvertersForExcel;L_LegacyConvertersForExcelDropID","uniqueId":1338,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"converters","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Listoferrormessagestocustomize","uniqueId":1484,"displayName":"List of error messages to customize","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Listoferrormessagestocustomize;L_listoferrormessagestocustomize87","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Enter error ID for Value Name and custom button text for Value","supportedPlatforms":["Windows"],"tags":["Customizable Error Messages","Microsoft Excel 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\customizablealerts","registrySubPath":"policyon","enforcedValues":{"enabled":1}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\customizablealerts","registrySubPath":"policyon","enforcedValues":{"enabled":1}}]}}},{"id":"excel16;L_Listoferrormessagestocustomize;L_listoferrormessagestocustomize87","uniqueId":1483,"displayName":"List of error messages to customize","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"Enter error ID for Value Name and custom button text for Value","supportedPlatforms":["Windows"],"tags":["Customizable Error Messages","Microsoft Excel 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\customizablealerts","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_ListOfManagedAddins","uniqueId":1517,"displayName":"List of managed add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_ListOfManagedAddins;L_ListOfManagedAddins2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify which add-ins are always enabled, always disabled (blocked), or configurable by the user. To block add-ins that are not managed by this policy setting, you must also configure the \"Block all unmanaged add-ins\" policy setting.\n\nTo enable this policy setting, provide the following information for each add-in:\n\nIn \"Value name,\" specify the programmatic identifier (ProgID) for COM add-ins, Excel Automation add-ins, and RTD add-ins, or specify the file name of Excel XLL add-ins and Excel add-ins.\n\nTo obtain the ProgID for an add-in, use Registry Editor on the client computer where the add-in is installed to locate key names under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Office\\Excel\\Addins or HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Office\\Excel\\Addins.\n\nTo obtain the file name of an add-in, click the File menu in the application where the add-in is installed. Click Options, click Add-ins, and then use the Location column to determine the file name of the add-in.\n\nYou can also obtain the ProgID or the file name of an add-in by using Office Telemetry Dashboard.\n\nIn \"Value,\" specify the value as follows:\n\nTo specify that an add-in is always disabled (blocked), type 0.\n\nTo specify that an add-in is always enabled, type 1.\n\nTo specify that an add-in is configurable by the user and not blocked by the \"Block all unmanaged add-ins\" policy setting when enabled, type 2.\n\nIf you disable or do not enable this policy setting, the list of managed add-ins is deleted. If the \"Block all unmanaged add-ins\" policy setting is enabled, then all add-ins are blocked.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Excel 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\resiliency\\addinlist","registrySubPath":"policyon","enforcedValues":{"enabled":1}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\resiliency\\addinlist","registrySubPath":"policyon","enforcedValues":{"enabled":1}}]}}},{"id":"excel16;L_ListOfManagedAddins;L_ListOfManagedAddins2","uniqueId":1516,"displayName":"List of managed add-ins","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to specify which add-ins are always enabled, always disabled (blocked), or configurable by the user. To block add-ins that are not managed by this policy setting, you must also configure the \"Block all unmanaged add-ins\" policy setting.\n\nTo enable this policy setting, provide the following information for each add-in:\n\nIn \"Value name,\" specify the programmatic identifier (ProgID) for COM add-ins, Excel Automation add-ins, and RTD add-ins, or specify the file name of Excel XLL add-ins and Excel add-ins.\n\nTo obtain the ProgID for an add-in, use Registry Editor on the client computer where the add-in is installed to locate key names under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Office\\Excel\\Addins or HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Office\\Excel\\Addins.\n\nTo obtain the file name of an add-in, click the File menu in the application where the add-in is installed. Click Options, click Add-ins, and then use the Location column to determine the file name of the add-in.\n\nYou can also obtain the ProgID or the file name of an add-in by using Office Telemetry Dashboard.\n\nIn \"Value,\" specify the value as follows:\n\nTo specify that an add-in is always disabled (blocked), type 0.\n\nTo specify that an add-in is always enabled, type 1.\n\nTo specify that an add-in is configurable by the user and not blocked by the \"Block all unmanaged add-ins\" policy setting when enabled, type 2.\n\nIf you disable or do not enable this policy setting, the list of managed add-ins is deleted. If the \"Block all unmanaged add-ins\" policy setting is enabled, then all add-ins are blocked.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Excel 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\resiliency\\addinlist","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_LoadpicturesfromWebpagesnotcreatedinExcel","uniqueId":1452,"displayName":"Load pictures from Web pages not created in Excel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting controls whether Excel loads graphics when opening Web pages that were not created in Excel.  It configures the \"Load pictures from Web pages not created in Excel\" option under the File tab | Options | Advanced | General | Web Options... | General tab.\n      \nIf you enable or do not configure this policy setting, Excel loads any graphics that are included in the pages, regardless of whether they were originally created in Excel.\n      \nIf you disable this policy setting, Excel will not load any pictures from Web pages that were not created in Excel.","supportedPlatforms":["Windows"],"tags":["General","Web Options...","Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\internet","registrySubPath":"donotloadpictures","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_MicrosoftExcelmenuorHelpkey;L_Helpkey","uniqueId":1453,"displayName":"Enter ASCII value","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"defaultValue":"47","description":"This policy setting allows you to set the ASCII value for the key of choice (e.g. '/'=47).","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"menukey","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_MicrosoftExcelmenuorHelpkey","uniqueId":1454,"displayName":"Microsoft Excel menu or Help key","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_MicrosoftExcelmenuorHelpkey;L_Helpkey","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to set the ASCII value for the key of choice (e.g. '/'=47).","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_MicrosoftOfficeOpenXMLConvertersForExcel","uniqueId":1341,"displayName":"Microsoft Office Open XML converters for Excel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_MicrosoftOfficeOpenXMLConvertersForExcel;L_MicrosoftOfficeOpenXMLConvertersForExcelDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_MicrosoftOfficeOpenXMLConvertersForExcel;L_MicrosoftOfficeOpenXMLConvertersForExcelDropID","uniqueId":1340,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"ooxmlconverters","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_MicrosoftOfficeQueryFiles","uniqueId":1329,"displayName":"Microsoft Office query files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_MicrosoftOfficeQueryFiles;L_MicrosoftOfficeQueryFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_MicrosoftOfficeQueryFiles;L_MicrosoftOfficeQueryFilesDropID","uniqueId":1328,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"officequeries","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_MoveselectionafterEnter","uniqueId":1463,"displayName":"Move selection after Enter","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Enabling this policy selects the Advanced (Editing Options) user option to \"After pressing Enter, move selection\".","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"fentermove_75_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_MoveselectionafterEnterdirection","uniqueId":1465,"displayName":"Move selection after Enter direction","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_MoveselectionafterEnterdirection;L_moveselectionafterenterdirection84","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the direction that the selection is moved after the Enter key is pressed.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_MoveselectionafterEnterdirection;L_moveselectionafterenterdirection84","uniqueId":1464,"displayName":"Move selection after Enter direction","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Down","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Right","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Up","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Left","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Specifies the direction that the selection is moved after the Enter key is pressed.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"moveenterdir","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_OfficeDataConnectionFiles","uniqueId":1331,"displayName":"Microsoft Office data connection files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_OfficeDataConnectionFiles;L_OfficeDataConnectionFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_OfficeDataConnectionFiles;L_OfficeDataConnectionFilesDropID","uniqueId":1330,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"officedataconnections","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_OfficeFileBlockIncludeTrustedFiles","uniqueId":5305,"displayName":"File Block includes trusted files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy setting controls whether File Block settings for a file type apply to Trusted Files of the same file type.\n\nIf you enable this policy setting, Trusted Files will have to follow what the File Block setting is for the given file type.\n\nIf you disable or do not configure this policy setting, Trusted Files will not follow the File Block setting for the given file type.","supportedPlatforms":["Windows"],"tags":["OfficeFileBlockIncludeTrustedFiles","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"IncludeTrustedFiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_OfflineCubeFiles","uniqueId":1335,"displayName":"Offline cube files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_OfflineCubeFiles;L_OfflineCubeFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_OfflineCubeFiles;L_OfflineCubeFilesDropID","uniqueId":1334,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"offlinecubefiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_OLAPPivotTableUserDefinedFunctionUDFsecuritysetting","uniqueId":1514,"displayName":"OLAP PivotTable User Defined Function (UDF) security setting","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_OLAPPivotTableUserDefinedFunctionUDFsecuritysetting;L_olappivottableuserdefinedfunctionudfsecuritysetting171","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"PivotTable reports can contain OLAP queries with references to User Defined Functions (UDFs). UDFs can be compiled executables, therefore posing a potential security threat. With this setting you can either (1) allow all UDFs in OLAP queries to execute with no IObjectSafety check, (2) allow only UDFs where the developer has used IObjectSafety to mark the UDF as a safe executable, or (3) disable all UDFs from executing in OLAP queries. The effect of setting this key is for Excel to pass the selected value to the OLAP provider.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_OLAPPivotTableUserDefinedFunctionUDFsecuritysetting;L_olappivottableuserdefinedfunctionudfsecuritysetting171","uniqueId":1513,"displayName":"OLAP PivotTable User Defined Function (UDF) security setting","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow ALL UDFs","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow safe UDFs only","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow NO UDFs","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"PivotTable reports can contain OLAP queries with references to User Defined Functions (UDFs). UDFs can be compiled executables, therefore posing a potential security threat. With this setting you can either (1) allow all UDFs in OLAP queries to execute with no IObjectSafety check, (2) allow only UDFs where the developer has used IObjectSafety to mark the UDF as a safe executable, or (3) disable all UDFs from executing in OLAP queries. The effect of setting this key is for Excel to pass the selected value to the OLAP provider.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"olapudfsecurity","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_OpenDocumentSpreadsheetFiles","uniqueId":1295,"displayName":"OpenDocument Spreadsheet files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_OpenDocumentSpreadsheetFiles;L_OpenDocumentSpreadsheetFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_OpenDocumentSpreadsheetFiles;L_OpenDocumentSpreadsheetFilesDropID","uniqueId":1294,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"opendocumentspreadsheet","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_OpenFilesOnLocalIntranetUNCInProtectedView","uniqueId":1227,"displayName":"Open files on local Intranet UNC in Protected View","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting lets you determine if files on local Intranet UNC file shares open in Protected View.\n\nIf you enable this policy setting, files on local Intranet UNC file shares open in Protected View if their UNC paths appear to be within the internet zone.\n\nIf you disable or do not configure this policy setting, files on Intranet UNC file shares do not open in Protected View if their UNC paths appear to be within the internet zone.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\protectedview","registrySubPath":"disableintranetcheck","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_OtherDataSourceFiles","uniqueId":1333,"displayName":"Other data source files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_OtherDataSourceFiles;L_OtherDataSourceFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_OtherDataSourceFiles;L_OtherDataSourceFilesDropID","uniqueId":1332,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"officedatasources","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_PerformFileValidationOnPivotCaches","uniqueId":1226,"displayName":"Perform file validation on pivot caches","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_PerformFileValidationOnPivotCaches;L_PerformFileValidationOnPivotCachesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy key configures whether or not pivot caches should go through file validation and get scanned for security problems when documents in Excel 97-2003 format are opened.\n\nIf you enable this policy setting, you may select one of these options:\n\n- No file validation: Never perform file validation on pivot caches for all Excel files (not recommended).\n- Web and email sources: Perform file validation on pivot caches for documents that come from the web and email, in addition to all documents that trigger pivot caches on load (default).\n- Always perform validation: Always perform file validation on pivot caches for all Excel files.\n\nThis setting can be overridden by the Object Model property Application.FileValidationPivot.\n\nIf you disable or do not configure this policy setting, the \"Web and email source\" setting will apply.","supportedPlatforms":["Windows"],"tags":["Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_PerformFileValidationOnPivotCaches;L_PerformFileValidationOnPivotCachesDropID","uniqueId":1225,"displayName":"Perform file validation on pivot caches","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No file validation","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Web and email sources","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Always perform validation","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This policy key configures whether or not pivot caches should go through file validation and get scanned for security problems when documents in Excel 97-2003 format are opened.\n\nIf you enable this policy setting, you may select one of these options:\n\n- No file validation: Never perform file validation on pivot caches for all Excel files (not recommended).\n- Web and email sources: Perform file validation on pivot caches for documents that come from the web and email, in addition to all documents that trigger pivot caches on load (default).\n- Always perform validation: Always perform file validation on pivot caches for all Excel files.\n\nThis setting can be overridden by the Object Model property Application.FileValidationPivot.\n\nIf you disable or do not configure this policy setting, the \"Web and email source\" setting will apply.","supportedPlatforms":["Windows"],"tags":["Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\filevalidation","registrySubPath":"pivotoptions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_PersonalTemplatesPath","uniqueId":1525,"displayName":"Personal templates path for Excel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_PersonalTemplatesPath;L_PersonalTemplatesPath","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the location of a user's personal templates. \n\nIf you enable this policy setting, users will see any templates they have saved in the specified location in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will change to be the specified location. \n\nIf you disable or do not configure this policy setting, users will not see templates they have saved in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will be their document save location.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_PersonalTemplatesPath;L_PersonalTemplatesPath","uniqueId":1524,"displayName":"Personal templates path for Excel","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting specifies the location of a user's personal templates. \n\nIf you enable this policy setting, users will see any templates they have saved in the specified location in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will change to be the specified location. \n\nIf you disable or do not configure this policy setting, users will not see templates they have saved in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will be their document save location.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"personaltemplates","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_Promptforworkbookproperties","uniqueId":1214,"displayName":"Prompt for workbook properties","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Save","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"fpromptsuminfo_65_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_R1C1referencestyle","uniqueId":1206,"displayName":"R1C1 reference style","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Formulas","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"frefa1_4_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Recentlyusedfilelist;L_Entriesonrecentlyusedfilelist","uniqueId":1479,"displayName":"Entries on recently used file list","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":50},"dataType":"Integer"},"description":"This policy setting specifies the number of entries displayed in the Recent Workbooks list that appears when users click Open on the File tab in Backstage view.\n\nIf you enable this policy setting, you can specify the number of entries to be between 0 and 50. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 25 items will be displayed in the Recent Workbooks list.\n\nNote: If you want to prevent items from being added to the Recent Workbooks list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\file mru","registrySubPath":"max display","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Recentlyusedfilelist","uniqueId":1480,"displayName":"Number of workbooks in the Recent Workbooks list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_Recentlyusedfilelist;L_Entriesonrecentlyusedfilelist","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the number of entries displayed in the Recent Workbooks list that appears when users click Open on the File tab in Backstage view.\n\nIf you enable this policy setting, you can specify the number of entries to be between 0 and 50. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 25 items will be displayed in the Recent Workbooks list.\n\nNote: If you want to prevent items from being added to the Recent Workbooks list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_RequirethatApplicationExtensionsaresigned","uniqueId":1278,"displayName":"Require that application add-ins are signed by Trusted Publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting controls whether add-ins for the specified Office 2016 applications must be digitally signed by a trusted publisher.\n \nIf you enable this policy setting, this application checks the digital signature for each add-in before loading it. If an add-in does not have a digital signature, or if the signature did not come from a trusted publisher, this application disables the add-in and notifies the user. Certificates must be added to the Trusted Publishers list if you require that all add-ins be signed by a trusted publisher. For detail on about obtaining and distributing certificates, see http://go.microsoft.com/fwlink/?LinkId=294922. Office 2016 stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store.  Office 2016 still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store. Therefore, if you created a list of trusted publishers in a previous version of Office and you upgrade to Office 2016, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store. For more information about trusted publishers, see the Office Resource Kit.\n\nIf you disable or do not configure this policy setting, Office 2016 applications do not check the digital signature on application add-ins before opening them. If a dangerous add-in is loaded, it could harm users' computers or compromise data security.\n","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security","registrySubPath":"requireaddinsig","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_SaveAutoRecoverinfo","uniqueId":1215,"displayName":"Save AutoRecover info","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Enabling this policy selects the user option to \"Save AutoRecover information every N minutes\".","supportedPlatforms":["Windows"],"tags":["Save","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"autorecoverenabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_SaveExcelfilesas","uniqueId":1213,"displayName":"Default file format","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_SaveExcelfilesas;L_saveexcelfilesas1","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls the default file format for saving workbooks in Excel.\n\nIf you enable this policy setting, you can set the default file format for Excel from among the following options:\n\n- Excel Workbook (.xlsx).This option is the default configuration in Excel 2016.\n- Excel Macro-Enabled Workbook (.xlsm)\n- Excel Binary Workbook (.xlsb)\n- Web Page (.htm; .html)\n- Excel 97-2003 Workbook (.xls)\n- Excel 5.0/95 Workbook (.xls)\n- OpenDocument Spreadsheet (*.ods)\n\nUsers can choose to save workbooks in a different file format than the default.\n\nIf you disable or you do not configure this policy setting, Excel saves new workbooks in the Office Open XML format with an .xlsx extension.","supportedPlatforms":["Windows"],"tags":["Save","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_SaveExcelfilesas;L_saveexcelfilesas1","uniqueId":1212,"displayName":"Save Excel files as","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":51,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Excel Workbook (*.xlsx)","description":"","tags":[],"dependencyGroup":null},{"value":52,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Excel Macro-Enabled Workbook (*.xlsm)","description":"","tags":[],"dependencyGroup":null},{"value":50,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Excel Binary Workbook (*.xlsb)","description":"","tags":[],"dependencyGroup":null},{"value":44,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Web Page (*.htm; *.html)","description":"","tags":[],"dependencyGroup":null},{"value":56,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Excel 97-2003 Workbook (*.xls)","description":"","tags":[],"dependencyGroup":null},{"value":39,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Excel 5.0/95 Workbook (*.xls)","description":"","tags":[],"dependencyGroup":null},{"value":60,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"OpenDocument Spreadsheet (*.ods)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":51,"description":"This policy setting controls the default file format for saving workbooks in Excel.\n\nIf you enable this policy setting, you can set the default file format for Excel from among the following options:\n\n- Excel Workbook (.xlsx).This option is the default configuration in Excel 2016.\n- Excel Macro-Enabled Workbook (.xlsm)\n- Excel Binary Workbook (.xlsb)\n- Web Page (.htm; .html)\n- Excel 97-2003 Workbook (.xls)\n- Excel 5.0/95 Workbook (.xls)\n- OpenDocument Spreadsheet (*.ods)\n\nUsers can choose to save workbooks in a different file format than the default.\n\nIf you disable or you do not configure this policy setting, Excel saves new workbooks in the Office Open XML format with an .xlsx extension.","supportedPlatforms":["Windows"],"tags":["Save","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"defaultformat","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_SetCNGCipherAlgorithm","uniqueId":1245,"displayName":"Set CNG cipher algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_SetCNGCipherAlgorithm;L_SetCNGCipherAlgorithmID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the CNG cipher algorithm that is used.\n\nIf you enable this policy setting, then the cipher provided will be used if it is a supported algorithm.\n\nIf you disable or do not configure this policy setting, AES will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_SetCNGCipherAlgorithm;L_SetCNGCipherAlgorithmID","uniqueId":1244,"displayName":"CNG cipher algorithm:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to configure the CNG cipher algorithm that is used.\n\nIf you enable this policy setting, then the cipher provided will be used if it is a supported algorithm.\n\nIf you disable or do not configure this policy setting, AES will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\crypto","registrySubPath":"cipheralgorithm","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_SetCNGCipherKeyLength","uniqueId":1249,"displayName":"Set CNG cipher key length","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_SetCNGCipherKeyLength;L_SetCNGCipherKeyLengthSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the number of bits to use when creating the cipher key.  This number will be rounded down to a multiple of 8.\n\nIf you enable this policy setting, the key bits specified will be used.\n\nIf you disable or do not configure this policy setting, the default value will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_SetCNGCipherKeyLength;L_SetCNGCipherKeyLengthSpinID","uniqueId":1248,"displayName":"Cipher key length","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":1000000},"dataType":"Integer"},"defaultValue":"","description":"This policy setting allows you to configure the number of bits to use when creating the cipher key.  This number will be rounded down to a multiple of 8.\n\nIf you enable this policy setting, the key bits specified will be used.\n\nIf you disable or do not configure this policy setting, the default value will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\crypto","registrySubPath":"cipherkeybits","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_SetCNGPasswordSpinCount","uniqueId":1258,"displayName":"Set CNG password spin count","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_SetCNGPasswordSpinCount;L_SetCNGPasswordSpinCountSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the number of times to spin (rehash) the password verifier.\n\nIf you enable this policy setting, the number specified will be the number of times the password will be rehashed.\n\nIf you disable or do not configure this policy setting, the default (100000) will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_SetCNGPasswordSpinCount;L_SetCNGPasswordSpinCountSpinID","uniqueId":1257,"displayName":"Set CNG password spin count","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":10000000},"dataType":"Integer"},"defaultValue":"100000","description":"This policy setting allows you to specify the number of times to spin (rehash) the password verifier.\n\nIf you enable this policy setting, the number specified will be the number of times the password will be rehashed.\n\nIf you disable or do not configure this policy setting, the default (100000) will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\crypto","registrySubPath":"passwordspincount","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_SetDefaultFileBlockBehavior","uniqueId":1285,"displayName":"Set default file block behavior","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_SetDefaultFileBlockBehavior;L_SetDefaultFileBlockBehaviorDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine if users can open, view, or edit Excel files.\n\nIf you enable this policy setting, you can set one of these options:\n- Blocked files are not opened\n- Blocked files open in Protected View and can not be edited\n- Blocked files open in Protected View and can be edited\n\nIf you disable or do not configure this policy setting, users will be able to open blocked files, but not edit them.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_SetDefaultFileBlockBehavior;L_SetDefaultFileBlockBehaviorDropID","uniqueId":1284,"displayName":"Set default file block behavior","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Blocked files are not opened","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Blocked files open in Protected View and can not be edited","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Blocked files open in Protected View and can be edited","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine if users can open, view, or edit Excel files.\n\nIf you enable this policy setting, you can set one of these options:\n- Blocked files are not opened\n- Blocked files open in Protected View and can not be edited\n- Blocked files open in Protected View and can be edited\n\nIf you disable or do not configure this policy setting, users will be able to open blocked files, but not edit them.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"openinprotectedview","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_SetDocumentBehaviorIfFileValidationFails","uniqueId":1233,"displayName":"Set document behavior if file validation fails","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_SetDocumentBehaviorIfFileValidationFails;L_SetDocumentBehaviorIfFileValidationFailsDropID","logicalOperator":"exists","values":null},{"dependee":"excel16;L_SetDocumentBehaviorIfFileValidationFails;L_SetDocumentBehaviorIfFileValidationFailsStr3","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls how Office handles documents when they fail file validation. \n\nIf you enable this policy setting, you can configure the following options for files that fail file validation:\n\n- Block files completely. Users cannot open the files.\n- Open files in Protected View and disallow edit. Users cannot edit the files. This is also how Office handles the files if you disable this policy setting.\n- Open files in Protected View and allow edit. Users can edit the files. This is also how Office handles the files if you do not configure this policy setting.\n\nIf you disable this policy setting, Office follows the \"Open files in Protected View and disallow edit\" behavior.\n\nIf you do not configure this policy setting, Office follows the \"Open files in Protected View and allow edit\" behavior.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_SetDocumentBehaviorIfFileValidationFails;L_SetDocumentBehaviorIfFileValidationFailsDropID","uniqueId":1231,"displayName":"Set document behavior if file validation fails","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block files","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":1,"description":"This policy setting controls how Office handles documents when they fail file validation. \n\nIf you enable this policy setting, you can configure the following options for files that fail file validation:\n\n- Block files completely. Users cannot open the files.\n- Open files in Protected View and disallow edit. Users cannot edit the files. This is also how Office handles the files if you disable this policy setting.\n- Open files in Protected View and allow edit. Users can edit the files. This is also how Office handles the files if you do not configure this policy setting.\n\nIf you disable this policy setting, Office follows the \"Open files in Protected View and disallow edit\" behavior.\n\nIf you do not configure this policy setting, Office follows the \"Open files in Protected View and allow edit\" behavior.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\filevalidation","registrySubPath":"openinprotectedview","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_SetDocumentBehaviorIfFileValidationFails;L_SetDocumentBehaviorIfFileValidationFailsStr3","uniqueId":1232,"displayName":"Checked: Allow edit.  Unchecked: Do not allow edit.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":1,"description":"This policy setting controls how Office handles documents when they fail file validation. \n\nIf you enable this policy setting, you can configure the following options for files that fail file validation:\n\n- Block files completely. Users cannot open the files.\n- Open files in Protected View and disallow edit. Users cannot edit the files. This is also how Office handles the files if you disable this policy setting.\n- Open files in Protected View and allow edit. Users can edit the files. This is also how Office handles the files if you do not configure this policy setting.\n\nIf you disable this policy setting, Office follows the \"Open files in Protected View and disallow edit\" behavior.\n\nIf you do not configure this policy setting, Office follows the \"Open files in Protected View and allow edit\" behavior.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\filevalidation","registrySubPath":"disableeditfrompv","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_SetMaximumNumberOfTrustedDocuments","uniqueId":1265,"displayName":"Set maximum number of trusted documents","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_SetMaximumNumberOfTrustedDocuments;L_SetMaximumNumberOfTrustedDocumentsSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the maximum number of trust records for trusted documents that can be stored in the registry before the purge task runs. The purge task reduces the number of trusted documents stored in the registry to the value set by the \"Set maximum number of trust records to preserve\" policy setting.\n\nIf you enable this policy setting, you can specify the maximum number of trusted documents to be stored in the registry before the purge task runs, with an upper limit of 20,000 documents. For performance reasons, we do not recommend setting this policy setting to the upper limit.\n\nIf you disable or do not configure this policy setting, the default value of 500 is used for the maximum number of trusted documents that can be stored in the registry before the purge task runs.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_SetMaximumNumberOfTrustedDocuments;L_SetMaximumNumberOfTrustedDocumentsSpinID","uniqueId":1264,"displayName":"Maximum number:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":20000},"dataType":"Integer"},"defaultValue":"500","description":"This policy setting allows you to specify the maximum number of trust records for trusted documents that can be stored in the registry before the purge task runs. The purge task reduces the number of trusted documents stored in the registry to the value set by the \"Set maximum number of trust records to preserve\" policy setting.\n\nIf you enable this policy setting, you can specify the maximum number of trusted documents to be stored in the registry before the purge task runs, with an upper limit of 20,000 documents. For performance reasons, we do not recommend setting this policy setting to the upper limit.\n\nIf you disable or do not configure this policy setting, the default value of 500 is used for the maximum number of trusted documents that can be stored in the registry before the purge task runs.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted documents","registrySubPath":"maxtrusteddocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_SetMaximumNumberOfTrustRecordsToPreserve","uniqueId":1267,"displayName":"Set maximum number of trust records to preserve","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_SetMaximumNumberOfTrustRecordsToPreserve;L_SetMaximumNumberOfTrustRecordsToPreserveSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the maximum number of trust records to preserve when the purge task detects that this application has trusted more than the number of trusted documents set by the \"Set maximum number of trusted documents\" policy setting.\n\nIf you enable this policy setting, you may specify the maximum number of trust records to preserve, with an upper limit of 20000.  Due to performance reasons, it is not recommended to set it to the upper limit.\n\nIf you disable or you do not configure this policy setting, the default value for of 400 is used.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_SetMaximumNumberOfTrustRecordsToPreserve;L_SetMaximumNumberOfTrustRecordsToPreserveSpinID","uniqueId":1266,"displayName":"Maximum to preserve:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":20000},"dataType":"Integer"},"defaultValue":"400","description":"This policy setting allows you to specify the maximum number of trust records to preserve when the purge task detects that this application has trusted more than the number of trusted documents set by the \"Set maximum number of trusted documents\" policy setting.\n\nIf you enable this policy setting, you may specify the maximum number of trust records to preserve, with an upper limit of 20000.  Due to performance reasons, it is not recommended to set it to the upper limit.\n\nIf you disable or you do not configure this policy setting, the default value for of 400 is used.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted documents","registrySubPath":"maxpreservetrusteddocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_SetNumberOfPlacesInTheRecentPlacesList","uniqueId":1446,"displayName":"Number of folders in the Recent Folders list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_SetNumberOfPlacesInTheRecentPlacesList;L_SetNumberOfPlacesInTheRecentPlacesListSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the number of unpinned entries displayed in the Recent Folders list that appears when users click Open or Save As on the File tab in Backstage view.\n\nIf you enable this policy setting, you can specify the number of unpinned entries to be between 0 and 20. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 5 unpinned items are displayed in the Recent Folders list.\n\nNote: If you want to prevent items from being added to the Recent Folders list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_SetNumberOfPlacesInTheRecentPlacesList;L_SetNumberOfPlacesInTheRecentPlacesListSpinID","uniqueId":1445,"displayName":"Number of folders in the Recent Folders list","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":20},"dataType":"Integer"},"defaultValue":"5","description":"This policy setting specifies the number of unpinned entries displayed in the Recent Folders list that appears when users click Open or Save As on the File tab in Backstage view.\n\nIf you enable this policy setting, you can specify the number of unpinned entries to be between 0 and 20. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 5 unpinned items are displayed in the Recent Folders list.\n\nNote: If you want to prevent items from being added to the Recent Folders list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\place mru","registrySubPath":"max display","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_SetParametersForCNGContext","uniqueId":1253,"displayName":"Set parameters for CNG context","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_SetParametersForCNGContext;L_SetParametersForCNGContextID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the encryption parameters that should be used for the CNG context. \n\nIf you enable this policy setting, the parameters specified will be passed to the CNG context.\n\nIf you disable or do not configure this policy setting, the default CNG values will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_SetParametersForCNGContext;L_SetParametersForCNGContextID","uniqueId":1252,"displayName":"Parameters","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to specify the encryption parameters that should be used for the CNG context. \n\nIf you enable this policy setting, the parameters specified will be passed to the CNG context.\n\nIf you disable or do not configure this policy setting, the default CNG values will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\crypto","registrySubPath":"context","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_ShowAlertIfNotDefault","uniqueId":1527,"displayName":"Show Alert if Excel is not the default for its associated file types","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls the \"Tell me if Microsoft Excel isn't the default progam for viewing and editing spreadsheets\" option found under File tab | Options.\n\nIf you enable or do not configure this policy setting, Excel will show an alert if it isn't the default progam for viewing and editing spreadsheets. This is the default behavior.\n\nIf you disable this policy setting, Excel will turn off the alert.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"alertifnotdefault","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Showcontrolcharacters","uniqueId":1451,"displayName":"Show control characters","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Enabling this policy selects the user option to \"Show control characters\". This option appears in the Advanced category when certain languages have been enabled.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"controlcharacters","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_ShowFormulabarinFullView","uniqueId":1475,"displayName":"Show Formula bar in Full View","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checked: Displays the Formula bar when the Full Screen command in the View menu is set. | Unchecked: Does not dispaly the Formula bar when the Full Screen command in the View menu is set.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"ffmlafull_68_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_ShowFormulabarinNormalView","uniqueId":1474,"displayName":"Show Formula bar in Normal View","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Enabling this setting selects the Advanced (Display) user option to \"Show formula bar\".","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"ffmlaf_1_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_ShowInsertOptionsbuttons","uniqueId":1473,"displayName":"Show Insert Options buttons","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting sets the \"Show Insert Options buttons\" option found under File tab | Options | Advanced | Cut, copy, and paste options.\n\nIf you enable or do not configure this policy setting, Excel will show the Insert Options button after inserting cells, rows, or columns that contain formatting. This is the default behavior.\n\nIf you disable this policy setting, Excel will not display the Insert Options buttons on insert.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"enableinsertcellsooui_102_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Shownames","uniqueId":1458,"displayName":"Show names","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Enabling this setting selects the Advanced (Display) user option to \"Show chart element names on hover\".","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"fshowchartnames_96_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_ShowPasteOptionsButtonWhenContentIsPasted","uniqueId":1472,"displayName":"Show Paste Options button when content is pasted","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting sets the \"Show Paste Options button when content is pasted\" option found under File tab | Options | Advanced | Cut, copy, and paste options.\n\nIf you enable or do not configure this policy setting, Excel will show the Paste Options button after inserting cells, rows, or columns that contain formatting. This is the default behavior.\n\nIf you disable this policy setting, Excel will not display the Paste Options buttons on paste.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"pasteoptions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Showvalues","uniqueId":1459,"displayName":"Show values","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Enabling this setting selects the Advanced (Display) user option to \"Show data point values on hover\".","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"fshowcharttipvalues_97_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_SpecifyCNGHashAlgorithm","uniqueId":1255,"displayName":"Specify CNG hash algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_SpecifyCNGHashAlgorithm;L_SpecifyCNGHashAlgorithmDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the hash algorithm used.\n\nIf you enable this policy setting, the hashing algorithm selected will be used by CNG.\n\nIf you disable or do not configure this policy setting, the default CNG hash algorithm will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_SpecifyCNGHashAlgorithm;L_SpecifyCNGHashAlgorithmDropID","uniqueId":1254,"displayName":"Specify CNG hash algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"SHA1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA1","description":"","tags":[],"dependencyGroup":null},{"value":"SHA256","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA256","description":"","tags":[],"dependencyGroup":null},{"value":"SHA384","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA384","description":"","tags":[],"dependencyGroup":null},{"value":"SHA512","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA512","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"SHA256","description":"This policy setting allows you to specify the hash algorithm used.\n\nIf you enable this policy setting, the hashing algorithm selected will be used by CNG.\n\nIf you disable or do not configure this policy setting, the default CNG hash algorithm will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\crypto","registrySubPath":"hashalgorithm","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_SpecifyCNGRandomNumberGeneratorAlgorithm","uniqueId":1260,"displayName":"Specify CNG random number generator algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_SpecifyCNGRandomNumberGeneratorAlgorithm;L_SpecifyCNGRandomNumberGeneratorAlgorithmID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the CNG random number generator to use.\n\nIf you enable this policy setting, the random number generator specified will be used.\n\nIf you disable or do not configure this policy setting, the default random number generator will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_SpecifyCNGRandomNumberGeneratorAlgorithm;L_SpecifyCNGRandomNumberGeneratorAlgorithmID","uniqueId":1259,"displayName":"Random number generator:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to configure the CNG random number generator to use.\n\nIf you enable this policy setting, the random number generator specified will be used.\n\nIf you disable or do not configure this policy setting, the default random number generator will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\crypto","registrySubPath":"rngalgorithm","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_SpecifyCNGSaltLength","uniqueId":1262,"displayName":"Specify CNG salt length","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_SpecifyCNGSaltLength;L_SpecifyCNGSaltLengthSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specific the number of bytes of salt that should be used.\n\nIf you enable this policy setting, the bytes specified will be used.\n\nIf you disable or do not configure this policy setting, the default length or 16 will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_SpecifyCNGSaltLength;L_SpecifyCNGSaltLengthSpinID","uniqueId":1261,"displayName":"Number of bytes","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":5000},"dataType":"Integer"},"defaultValue":"16","description":"This policy setting allows you to specific the number of bytes of salt that should be used.\n\nIf you enable this policy setting, the bytes specified will be used.\n\nIf you disable or do not configure this policy setting, the default length or 16 will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\crypto","registrySubPath":"saltbytes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_SpecifyEncryptionCompatibility","uniqueId":1251,"displayName":"Specify encryption compatibility","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_SpecifyEncryptionCompatibility;L_SpecifyEncryptionCompatibilityDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the encrypted database compatibility.\n\nIf you enable this policy setting, the compatibility format specified will be applied during encryption for new files\n- Use legacy format\n- Use next generation format\n- All files save with next generation format\n\nIf you disable or do not configure this policy setting, the default setting, \"Use next generation format,\" will be applied.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_SpecifyEncryptionCompatibility;L_SpecifyEncryptionCompatibilityDropID","uniqueId":1250,"displayName":"Specify encryption compatibility","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use legacy format","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use next generation format","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"All files save with next generation format","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":2,"description":"This policy setting allows you to specify the encrypted database compatibility.\n\nIf you enable this policy setting, the compatibility format specified will be applied during encryption for new files\n- Use legacy format\n- Use next generation format\n- All files save with next generation format\n\nIf you disable or do not configure this policy setting, the default setting, \"Use next generation format,\" will be applied.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\crypto","registrySubPath":"compatmode","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_StopCheckingAltTextAccessibilityInformation","uniqueId":1189,"displayName":"Stop checking for alt text accessibility information","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that objects such as images and shapes contain alternative text.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that objects such as images and shapes contain alternative text.\n\nIf you disable or do not configure this policy setting, objects will be checked for alternative text and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File tab","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\accchecker","registrySubPath":"alttext","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_StopCheckingForBlankTableRowsUsedAsFormatting","uniqueId":1196,"displayName":"Stop checking for blank table rows used as formatting","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting allows you to configure Accessibility Checker and whether it checks for blank table rows used as formatting.\n\nIf you enable this policy setting, no check for blank table rows used as formatting will be done.\n\nIf you disable or do not configure this policy setting, tables will be checked for blank rows and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File tab","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\accchecker","registrySubPath":"blanktablerows","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_StopCheckingForMergedCells","uniqueId":1193,"displayName":"Stop checking for merged cells","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting allows you to configure whether Accessibility Checker will verify that tables do not have merged cells.\n\nIf you enable this policy setting, no check will be made.\n\nIf you disable or do not configure this policy setting, worksheets will be checked for merged cells and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File tab","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\accchecker","registrySubPath":"mergedcells","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_StopCheckingTableAltTextAccessibilityInformation","uniqueId":1190,"displayName":"Stop checking for table alt text accessibility information","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that tables contain alternative text.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that tables contain alternative text.\n\nIf you disable or do not configure this policy setting, tables will be checked for alternative text and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File tab","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\accchecker","registrySubPath":"tablealttext","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_StopCheckingTableHeaderAccessibilityInformation","uniqueId":1191,"displayName":"Stop checking for table header accessibility information","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that tables have a header row specified.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that tables have a header row specified.\n\nIf you disable or do not configure this policy setting, tables will be checked for header rows and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File tab","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\accchecker","registrySubPath":"tableheaders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_StopCheckingToEnsureHyperlinkTextIsMeaningful","uniqueId":1194,"displayName":"Stop checking to ensure hyperlink text is meaningful","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that hyperlinks have meaningful text.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that hyperlinks have meaningful text.\n\nIf you disable or do not configure this policy setting, hyperlink text will be checked and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File tab","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\accchecker","registrySubPath":"meaningfulhyperlinks","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_StopCheckingToEnsureNonDefaultSheetNames","uniqueId":1195,"displayName":"Stop checking to ensure non-default sheet names","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that worksheets with content have non-default names.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that worksheets with content have non-default names.\n\nIf you disable or do not configure this policy setting, worksheet names will be checked and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File tab","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\accchecker","registrySubPath":"sheetnames","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_StopCheckingToEnsureWorkbooksAllowProgrammaticAccess","uniqueId":1192,"displayName":"Stop checking to ensure workbooks allow programmatic access","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting allows you to configure Accessibility Checker and whether it checks to ensure that workbooks have not blocked programmatic access through DRM.\n\nIf you enable this policy setting, no check will be made.\n\nIf you disable or do not configure this policy setting, workbooks will be checked for programmatic access and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File tab","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\accchecker","registrySubPath":"programmaticaccess","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_StoremacroinPersonalMacroWorkbookbydefault","uniqueId":1275,"displayName":"Store macro in Personal Macro Workbook by default","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls the default location for storing macros in Excel.\n      \n      If this policy setting is enabled, Excel stores macros in users' personal macro workbook.\n      \n      If you disable or do not configure this policy setting, Excel stores macros in the active workbook from which they are created.\n      \n      Note: In the user interface (UI), the \"Store macro in\" drop down list box in the Record Macro dialog box (Macros | Record Macro) allows users to choose whether to store the new macro in the current workbook, a new workbook, or their personal macro workbook (Personal.xlsb), a hidden workbook that opens every time Excel starts.\n      \n      By default, Excel displays the \"Store macro in\" box with \"This Workbook\" already selected in the drop-down list. If a user saves a macro in the active workbook and then distributes the workbook to others, the macro is distributed along with the workbook.  If you enable this policy setting, Excel displays the \"Store macro in\" box with \"Personal Macro Workbook\" already selected. Users can still select one of the other two options in the drop-down menu.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"fglobalsheet_37_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TextFiles","uniqueId":1323,"displayName":"Text files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TextFiles;L_TextFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TextFiles;L_TextFilesDropID","uniqueId":1322,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"textfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_Transitionnavigationkeys","uniqueId":1455,"displayName":"Transition navigation keys","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Enabling this policy checks the Advanced (Lotus compatibility) user option named \"Transition navigation keys\".","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"fisi_33_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustaccesstoVisualBasicProject","uniqueId":1276,"displayName":"Trust access to Visual Basic Project","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether automation clients such as Microsoft Visual Studio 2005 Tools for Microsoft Office (VSTO) can access the Visual Basic for Applications project system in the specified applications. VSTO projects require access to the Visual Basic for Applications project system in Excel, PowerPoint, and Word, even though the projects do not use Visual Basic for Applications. Design-time support of controls in both Visual Basic and C# projects depends on the Visual Basic for Applications project system in Word and Excel.\n\nIf you enable this policy setting, VSTO and other automation clients can access the Visual Basic for Applications project system in the specified applications. Users will not be able to change this behavior through the \"Trust access to the VBA project object model\" user interface option under the Macro Settings section of the Trust Center.\n\nIf you disable this policy setting, VSTO does not have programmatic access to VBA projects. In addition, the \"Trust access to the VBA project object model\" check box is cleared and users cannot change it.  Note: Disabling this policy setting prevents VSTO projects from interacting properly with the VBA project system in the selected application.\n\nIf you do not configure this policy setting, automation clients do not have programmatic access to VBA projects. Users can enable this by selecting the \"Trust access to the VBA project object model\" in the \"Macro Settings\" section of the Trust Center. However, doing so allows macros in any documents the user opens to access the core Visual Basic objects, methods, and properties, which represents a potential security hazard.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security","registrySubPath":"accessvbom","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc01;L_Allowsubfolders","uniqueId":1348,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location1","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc01;L_Datecolon","uniqueId":1346,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location1","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc01;L_Descriptioncolon","uniqueId":1347,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location1","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc01;L_Pathcolon","uniqueId":1345,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location1","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc01","uniqueId":1349,"displayName":"Trusted Location #1","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TrustedLoc01;L_Pathcolon","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc01;L_Datecolon","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc01;L_Descriptioncolon","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc01;L_Allowsubfolders","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TrustedLoc02;L_allowsubfolders8","uniqueId":1353,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location2","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc02;L_datecolon6","uniqueId":1351,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location2","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc02;L_descriptioncolon7","uniqueId":1352,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location2","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc02;L_pathcolon5","uniqueId":1350,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location2","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc02","uniqueId":1354,"displayName":"Trusted Location #2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TrustedLoc02;L_pathcolon5","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc02;L_datecolon6","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc02;L_descriptioncolon7","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc02;L_allowsubfolders8","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TrustedLoc03;L_allowsubfolders12","uniqueId":1358,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location3","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc03;L_datecolon10","uniqueId":1356,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location3","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc03;L_descriptioncolon11","uniqueId":1357,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location3","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc03;L_pathcolon9","uniqueId":1355,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location3","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc03","uniqueId":1359,"displayName":"Trusted Location #3","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TrustedLoc03;L_pathcolon9","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc03;L_datecolon10","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc03;L_descriptioncolon11","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc03;L_allowsubfolders12","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TrustedLoc04;L_allowsubfolders16","uniqueId":1363,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location4","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc04;L_datecolon14","uniqueId":1361,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location4","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc04;L_descriptioncolon15","uniqueId":1362,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location4","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc04;L_pathcolon13","uniqueId":1360,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location4","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc04","uniqueId":1364,"displayName":"Trusted Location #4","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TrustedLoc04;L_pathcolon13","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc04;L_datecolon14","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc04;L_descriptioncolon15","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc04;L_allowsubfolders16","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TrustedLoc05;L_allowsubfolders20","uniqueId":1368,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location5","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc05;L_datecolon18","uniqueId":1366,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location5","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc05;L_descriptioncolon19","uniqueId":1367,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location5","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc05;L_pathcolon17","uniqueId":1365,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location5","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc05","uniqueId":1369,"displayName":"Trusted Location #5","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TrustedLoc05;L_pathcolon17","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc05;L_datecolon18","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc05;L_descriptioncolon19","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc05;L_allowsubfolders20","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TrustedLoc06;L_allowsubfolders24","uniqueId":1373,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location6","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc06;L_datecolon22","uniqueId":1371,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location6","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc06;L_descriptioncolon23","uniqueId":1372,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location6","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc06;L_pathcolon21","uniqueId":1370,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location6","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc06","uniqueId":1374,"displayName":"Trusted Location #6","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TrustedLoc06;L_pathcolon21","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc06;L_datecolon22","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc06;L_descriptioncolon23","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc06;L_allowsubfolders24","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TrustedLoc07;L_allowsubfolders28","uniqueId":1378,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location7","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc07;L_datecolon26","uniqueId":1376,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location7","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc07;L_descriptioncolon27","uniqueId":1377,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location7","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc07;L_pathcolon25","uniqueId":1375,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location7","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc07","uniqueId":1379,"displayName":"Trusted Location #7","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TrustedLoc07;L_pathcolon25","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc07;L_datecolon26","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc07;L_descriptioncolon27","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc07;L_allowsubfolders28","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TrustedLoc08;L_allowsubfolders32","uniqueId":1383,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location8","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc08;L_datecolon30","uniqueId":1381,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location8","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc08;L_descriptioncolon31","uniqueId":1382,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location8","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc08;L_pathcolon29","uniqueId":1380,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location8","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc08","uniqueId":1384,"displayName":"Trusted Location #8","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TrustedLoc08;L_pathcolon29","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc08;L_datecolon30","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc08;L_descriptioncolon31","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc08;L_allowsubfolders32","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TrustedLoc09;L_allowsubfolders36","uniqueId":1388,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location9","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc09;L_datecolon34","uniqueId":1386,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location9","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc09;L_descriptioncolon35","uniqueId":1387,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location9","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc09;L_pathcolon33","uniqueId":1385,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location9","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc09","uniqueId":1389,"displayName":"Trusted Location #9","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TrustedLoc09;L_pathcolon33","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc09;L_datecolon34","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc09;L_descriptioncolon35","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc09;L_allowsubfolders36","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TrustedLoc10;L_allowsubfolders40","uniqueId":1393,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location10","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc10;L_datecolon38","uniqueId":1391,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location10","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc10;L_descriptioncolon39","uniqueId":1392,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location10","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc10;L_pathcolon37","uniqueId":1390,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location10","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc10","uniqueId":1394,"displayName":"Trusted Location #10","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TrustedLoc10;L_pathcolon37","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc10;L_datecolon38","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc10;L_descriptioncolon39","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc10;L_allowsubfolders40","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TrustedLoc11;L_allowsubfolders44","uniqueId":1398,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location11","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc11;L_datecolon42","uniqueId":1396,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location11","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc11;L_descriptioncolon43","uniqueId":1397,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location11","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc11;L_pathcolon41","uniqueId":1395,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location11","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc11","uniqueId":1399,"displayName":"Trusted Location #11","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TrustedLoc11;L_pathcolon41","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc11;L_datecolon42","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc11;L_descriptioncolon43","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc11;L_allowsubfolders44","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TrustedLoc12;L_allowsubfolders48","uniqueId":1403,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location12","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc12;L_datecolon46","uniqueId":1401,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location12","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc12;L_descriptioncolon47","uniqueId":1402,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location12","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc12;L_pathcolon45","uniqueId":1400,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location12","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc12","uniqueId":1404,"displayName":"Trusted Location #12","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TrustedLoc12;L_pathcolon45","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc12;L_datecolon46","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc12;L_descriptioncolon47","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc12;L_allowsubfolders48","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TrustedLoc13;L_allowsubfolders52","uniqueId":1408,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location13","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc13;L_datecolon50","uniqueId":1406,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location13","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc13;L_descriptioncolon51","uniqueId":1407,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location13","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc13;L_pathcolon49","uniqueId":1405,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location13","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc13","uniqueId":1409,"displayName":"Trusted Location #13","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TrustedLoc13;L_pathcolon49","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc13;L_datecolon50","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc13;L_descriptioncolon51","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc13;L_allowsubfolders52","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TrustedLoc14;L_allowsubfolders56","uniqueId":1413,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location14","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc14;L_datecolon54","uniqueId":1411,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location14","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc14;L_descriptioncolon55","uniqueId":1412,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location14","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc14;L_pathcolon53","uniqueId":1410,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location14","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc14","uniqueId":1414,"displayName":"Trusted Location #14","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TrustedLoc14;L_pathcolon53","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc14;L_datecolon54","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc14;L_descriptioncolon55","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc14;L_allowsubfolders56","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TrustedLoc15;L_allowsubfolders60","uniqueId":1418,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location15","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc15;L_datecolon58","uniqueId":1416,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location15","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc15;L_descriptioncolon59","uniqueId":1417,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location15","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc15;L_pathcolon57","uniqueId":1415,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location15","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc15","uniqueId":1419,"displayName":"Trusted Location #15","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TrustedLoc15;L_pathcolon57","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc15;L_datecolon58","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc15;L_descriptioncolon59","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc15;L_allowsubfolders60","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TrustedLoc16;L_allowsubfolders64","uniqueId":1423,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location16","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc16;L_datecolon62","uniqueId":1421,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location16","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc16;L_descriptioncolon63","uniqueId":1422,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location16","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc16;L_pathcolon61","uniqueId":1420,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location16","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc16","uniqueId":1424,"displayName":"Trusted Location #16","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TrustedLoc16;L_pathcolon61","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc16;L_datecolon62","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc16;L_descriptioncolon63","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc16;L_allowsubfolders64","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TrustedLoc17;L_allowsubfolders68","uniqueId":1428,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location17","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc17;L_datecolon66","uniqueId":1426,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location17","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc17;L_descriptioncolon67","uniqueId":1427,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location17","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc17;L_pathcolon65","uniqueId":1425,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location17","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc17","uniqueId":1429,"displayName":"Trusted Location #17","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TrustedLoc17;L_pathcolon65","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc17;L_datecolon66","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc17;L_descriptioncolon67","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc17;L_allowsubfolders68","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TrustedLoc18;L_allowsubfolders72","uniqueId":1433,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location18","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc18;L_datecolon70","uniqueId":1431,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location18","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc18;L_descriptioncolon71","uniqueId":1432,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location18","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc18;L_pathcolon69","uniqueId":1430,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location18","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc18","uniqueId":1434,"displayName":"Trusted Location #18","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TrustedLoc18;L_pathcolon69","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc18;L_datecolon70","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc18;L_descriptioncolon71","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc18;L_allowsubfolders72","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TrustedLoc19;L_allowsubfolders76","uniqueId":1438,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location19","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc19;L_datecolon74","uniqueId":1436,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location19","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc19;L_descriptioncolon75","uniqueId":1437,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location19","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc19;L_pathcolon73","uniqueId":1435,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location19","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc19","uniqueId":1439,"displayName":"Trusted Location #19","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TrustedLoc19;L_pathcolon73","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc19;L_datecolon74","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc19;L_descriptioncolon75","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc19;L_allowsubfolders76","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TrustedLoc20;L_allowsubfolders80","uniqueId":1443,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location20","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc20;L_datecolon78","uniqueId":1441,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location20","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc20;L_descriptioncolon79","uniqueId":1442,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location20","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc20;L_pathcolon77","uniqueId":1440,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted locations\\location20","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"excel16;L_TrustedLoc20","uniqueId":1444,"displayName":"Trusted Location #20","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_TrustedLoc20;L_pathcolon77","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc20;L_datecolon78","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc20;L_descriptioncolon79","logicalOperator":"exists","values":null},{"dependee":"excel16;L_TrustedLoc20;L_allowsubfolders80","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder as a trusted location from which to open 2016 Word, Excel, PowerPoint, Access and Visio files.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you can specify a trusted location (or folder) from which the 2016 Office application can open the files which run macros without warning.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_TurnOffFileFormatCompatiblityDialogForODS","uniqueId":1224,"displayName":"Suppress file format compatibility dialog box for OpenDocument Spreadsheet format","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to configure the file format compatibility dialog box when saving a file as an OpenDocument Spreadsheet file in Microsoft Excel.\n\nIf you enable this policy setting, the file format compatibility dialog is not displayed whenever you save as an OpenDocument Spreadsheet file in Excel.\n\nIf you disable or do not configure this policy setting, the file format compatibility dialog is displayed when you save as an OpenDocument Spreadsheet file in Excel.","supportedPlatforms":["Windows"],"tags":["Save","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"disablesaveaslosswarningopendocumentspreadsheet","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TurnOffFileSynchronizationViaSOAPOverHTTP","uniqueId":1508,"displayName":"Turn off file synchronization via SOAP over HTTP","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls file synchronization via SOAP over HTTP for Excel.\n\nIf you enable this policy setting, file synchronization via SOAP over HTTP is turned off for Excel.\n\nIf you disable or do not configure this policy setting this policy setting, file synchronization via SOAP over HTTP is turned on for Excel.\n\nNote: Turning off file synchronization via SOAP over HTTP will adversely affect the behavior of SharePoint Workspaces.","supportedPlatforms":["Windows"],"tags":["Server Settings","Miscellaneous","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"fsshttpoffexcel","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TurnOffFileValidation","uniqueId":1239,"displayName":"Turn off file validation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting allows you turn off the file validation feature.\n\nIf you enable this policy setting, file validation will be turned off.\n\nIf you disable or do not configure this policy setting, file validation will be turned on.  Office Binary Documents (97-2003) are checked to see if they conform against the file format schema before they are opened.","supportedPlatforms":["Windows"],"tags":["Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\filevalidation","registrySubPath":"enableonload","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TurnOffProtectedViewForAttachmentsOpenedFromOutlook","uniqueId":1230,"displayName":"Turn off Protected View for attachments opened from Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting allows you to determine if Excel files in Outlook attachments open in Protected View.\n\nIf you enable this policy setting, Outlook attachments do not open in Protected View.\n\nIf you disable or do not configure this policy setting, Outlook attachments open in Protected View.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\protectedview","registrySubPath":"disableattachmentsinpv","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TurnOffTrustedDocuments","uniqueId":1280,"displayName":"Turn off trusted documents","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off the trusted documents feature.  The trusted documents feature allows users to always enable active content in documents such as macros, ActiveX controls, data connections, etc. so that they are not prompted the next time they open the documents.  Trusted documents are exempt from security notifications.\n\nIf you enable this policy setting, you will turn off the trusted documents feature.  Users will receive a security prompt every time a document containing active content is opened.\n\nIf you disable or do not configure this policy setting, documents will be trusted when users enable content for a document, and users will not receive a security prompt.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted documents","registrySubPath":"disabletrusteddocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_TurnOffTrustedDocumentsOnTheNetwork","uniqueId":1263,"displayName":"Turn off Trusted Documents on the network","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off the trusted documents feature for documents opened from the network.\n\nIf you enable this policy setting, users will always see security notifications for active content such as macros, ActiveX controls, data connections, etc. for documents opened from the network.\n\nIf you disable or do not configure this policy setting, the trusted documents feature allows users to always allow active content in documents such as macros, ActiveX controls, data connections, etc. so that users are not prompted the next time they open the documents.  Trusted documents are exempt from security notifications.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\trusted documents","registrySubPath":"disablenetworktrusteddocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_UseNewKeyOnPasswordChange","uniqueId":1256,"displayName":"Use new key on password change","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to specify if a new encryption key is used when the password is changed.\n\nIf you enable or do not configure this policy setting, a new intermediate key is generated when the password is changed. This causes any extra key encryptors to be removed when the file is saved.\n\nIf you disable this policy setting, a new intermediate key is not generated when the password is changed.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\crypto","registrySubPath":"newkeyonpwdchange","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_VBAWarningsPolicy;L_empty4","uniqueId":1268,"displayName":"Macro Notification Settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable VBA macros without notification","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable VBA macros with notification","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable VBA macros except digitally signed macros","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable VBA macros (not recommended)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":3,"recommendation":"security"}],"defaultValue":4,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros or Excel 4.0 (XLM) macros are present. Multiple Office apps support VBA macros, but XLM macros are only supported by Excel.\n\nIf you enable this policy setting, you can choose from four options to determine how the specified applications will warn the user about VBA macros. There is also a check box that determines how Excel will warn the user about XLM macros.\n\nFor VBA macros, these are your choices:\n\n- Disable VBA macros without notification: The application disables VBA macros, whether signed or unsigned, and does not notify users.\n\n- Disable VBA macros with notification: The application displays the Trust Bar for VBA macros, whether signed or unsigned. This option enforces the default configuration in Office.\n\n- Disable VBA macros except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n\n- Enable VBA macros (not recommended): VBA macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n\nIf you disable or don’t configure this policy setting, \"Disable VBA macros with notification\" will be the default setting, and “Enable Excel 4.0 macros when VBA macros are enabled” will be checked. When users open files in the specified applications that contain VBA or XLM macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.\n\nThe following section only applies to Excel 4.0 (XLM) macros:\n\nIf you select the “Enable Excel 4.0 macros when VBA macros are enabled” check box, the setting selected for VBA macros will also apply to XLM macros. If this check box is not selected, all XLM macros are disabled and users are not notified.\n\nXLM macros cannot be signed and will be disabled if “Disable VBA macros except digitally signed macros” is chosen.\n\nIf you have enabled the “Prevent Excel from running XLM macros” policy setting, XLM macros cannot be run in Excel regardless of how you have configured this policy setting.\n\nThe following section only applies to VBA macros:\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running.\n\nAnd there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: The three check boxes about trusted publishers only apply to Version 2012 and later of Office and Visio. The “Enable Excel 4.0 macros when VBA macros are enabled” check box only applies to Version 2111 and later of Office. None of the check boxes apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases. \n\nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n\nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security","registrySubPath":"vbawarnings","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_VBAWarningsPolicy;L_VBADigSigTrustedPublishersStr","uniqueId":1270,"displayName":"Require macros to be signed by a trusted publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros or Excel 4.0 (XLM) macros are present. Multiple Office apps support VBA macros, but XLM macros are only supported by Excel.\n\nIf you enable this policy setting, you can choose from four options to determine how the specified applications will warn the user about VBA macros. There is also a check box that determines how Excel will warn the user about XLM macros.\n\nFor VBA macros, these are your choices:\n\n- Disable VBA macros without notification: The application disables VBA macros, whether signed or unsigned, and does not notify users.\n\n- Disable VBA macros with notification: The application displays the Trust Bar for VBA macros, whether signed or unsigned. This option enforces the default configuration in Office.\n\n- Disable VBA macros except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n\n- Enable VBA macros (not recommended): VBA macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n\nIf you disable or don’t configure this policy setting, \"Disable VBA macros with notification\" will be the default setting, and “Enable Excel 4.0 macros when VBA macros are enabled” will be checked. When users open files in the specified applications that contain VBA or XLM macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.\n\nThe following section only applies to Excel 4.0 (XLM) macros:\n\nIf you select the “Enable Excel 4.0 macros when VBA macros are enabled” check box, the setting selected for VBA macros will also apply to XLM macros. If this check box is not selected, all XLM macros are disabled and users are not notified.\n\nXLM macros cannot be signed and will be disabled if “Disable VBA macros except digitally signed macros” is chosen.\n\nIf you have enabled the “Prevent Excel from running XLM macros” policy setting, XLM macros cannot be run in Excel regardless of how you have configured this policy setting.\n\nThe following section only applies to VBA macros:\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running.\n\nAnd there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: The three check boxes about trusted publishers only apply to Version 2012 and later of Office and Visio. The “Enable Excel 4.0 macros when VBA macros are enabled” check box only applies to Version 2111 and later of Office. None of the check boxes apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases. \n\nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n\nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security","registrySubPath":"vbadigsigtrustedpublishers","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_VBAWarningsPolicy;L_VBAOnlyAllowDigSigWithCodeSigningEKUStr","uniqueId":1272,"displayName":"Require Extended Key Usage (EKU) for certificates from trusted publishers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros or Excel 4.0 (XLM) macros are present. Multiple Office apps support VBA macros, but XLM macros are only supported by Excel.\n\nIf you enable this policy setting, you can choose from four options to determine how the specified applications will warn the user about VBA macros. There is also a check box that determines how Excel will warn the user about XLM macros.\n\nFor VBA macros, these are your choices:\n\n- Disable VBA macros without notification: The application disables VBA macros, whether signed or unsigned, and does not notify users.\n\n- Disable VBA macros with notification: The application displays the Trust Bar for VBA macros, whether signed or unsigned. This option enforces the default configuration in Office.\n\n- Disable VBA macros except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n\n- Enable VBA macros (not recommended): VBA macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n\nIf you disable or don’t configure this policy setting, \"Disable VBA macros with notification\" will be the default setting, and “Enable Excel 4.0 macros when VBA macros are enabled” will be checked. When users open files in the specified applications that contain VBA or XLM macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.\n\nThe following section only applies to Excel 4.0 (XLM) macros:\n\nIf you select the “Enable Excel 4.0 macros when VBA macros are enabled” check box, the setting selected for VBA macros will also apply to XLM macros. If this check box is not selected, all XLM macros are disabled and users are not notified.\n\nXLM macros cannot be signed and will be disabled if “Disable VBA macros except digitally signed macros” is chosen.\n\nIf you have enabled the “Prevent Excel from running XLM macros” policy setting, XLM macros cannot be run in Excel regardless of how you have configured this policy setting.\n\nThe following section only applies to VBA macros:\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running.\n\nAnd there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: The three check boxes about trusted publishers only apply to Version 2012 and later of Office and Visio. The “Enable Excel 4.0 macros when VBA macros are enabled” check box only applies to Version 2111 and later of Office. None of the check boxes apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases. \n\nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n\nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security","registrySubPath":"vbarequiredigsigwithcodesigningeku","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_VBAWarningsPolicy;L_VBAOnlyAllowLMTrustedPublisherStr","uniqueId":1271,"displayName":"Block certificates from trusted publishers that are only installed in the current user certificate store","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros or Excel 4.0 (XLM) macros are present. Multiple Office apps support VBA macros, but XLM macros are only supported by Excel.\n\nIf you enable this policy setting, you can choose from four options to determine how the specified applications will warn the user about VBA macros. There is also a check box that determines how Excel will warn the user about XLM macros.\n\nFor VBA macros, these are your choices:\n\n- Disable VBA macros without notification: The application disables VBA macros, whether signed or unsigned, and does not notify users.\n\n- Disable VBA macros with notification: The application displays the Trust Bar for VBA macros, whether signed or unsigned. This option enforces the default configuration in Office.\n\n- Disable VBA macros except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n\n- Enable VBA macros (not recommended): VBA macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n\nIf you disable or don’t configure this policy setting, \"Disable VBA macros with notification\" will be the default setting, and “Enable Excel 4.0 macros when VBA macros are enabled” will be checked. When users open files in the specified applications that contain VBA or XLM macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.\n\nThe following section only applies to Excel 4.0 (XLM) macros:\n\nIf you select the “Enable Excel 4.0 macros when VBA macros are enabled” check box, the setting selected for VBA macros will also apply to XLM macros. If this check box is not selected, all XLM macros are disabled and users are not notified.\n\nXLM macros cannot be signed and will be disabled if “Disable VBA macros except digitally signed macros” is chosen.\n\nIf you have enabled the “Prevent Excel from running XLM macros” policy setting, XLM macros cannot be run in Excel regardless of how you have configured this policy setting.\n\nThe following section only applies to VBA macros:\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running.\n\nAnd there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: The three check boxes about trusted publishers only apply to Version 2012 and later of Office and Visio. The “Enable Excel 4.0 macros when VBA macros are enabled” check box only applies to Version 2111 and later of Office. None of the check boxes apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases. \n\nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n\nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security","registrySubPath":"vbarequirelmtrustedpublisher","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_VBAWarningsPolicy","uniqueId":1273,"displayName":"Macro Notification Settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_VBAWarningsPolicy;L_empty4","logicalOperator":"exists","values":null},{"dependee":"excel16;L_VBAWarningsPolicy;L_XL4WarningPolicy","logicalOperator":"exists","values":null},{"dependee":"excel16;L_VBAWarningsPolicy;L_VBADigSigTrustedPublishersStr","logicalOperator":"exists","values":null},{"dependee":"excel16;L_VBAWarningsPolicy;L_VBAOnlyAllowLMTrustedPublisherStr","logicalOperator":"exists","values":null},{"dependee":"excel16;L_VBAWarningsPolicy;L_VBAOnlyAllowDigSigWithCodeSigningEKUStr","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros or Excel 4.0 (XLM) macros are present. Multiple Office apps support VBA macros, but XLM macros are only supported by Excel.\n\nIf you enable this policy setting, you can choose from four options to determine how the specified applications will warn the user about VBA macros. There is also a check box that determines how Excel will warn the user about XLM macros.\n\nFor VBA macros, these are your choices:\n\n- Disable VBA macros without notification: The application disables VBA macros, whether signed or unsigned, and does not notify users.\n\n- Disable VBA macros with notification: The application displays the Trust Bar for VBA macros, whether signed or unsigned. This option enforces the default configuration in Office.\n\n- Disable VBA macros except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n\n- Enable VBA macros (not recommended): VBA macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n\nIf you disable or don’t configure this policy setting, \"Disable VBA macros with notification\" will be the default setting, and “Enable Excel 4.0 macros when VBA macros are enabled” will be checked. When users open files in the specified applications that contain VBA or XLM macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.\n\nThe following section only applies to Excel 4.0 (XLM) macros:\n\nIf you select the “Enable Excel 4.0 macros when VBA macros are enabled” check box, the setting selected for VBA macros will also apply to XLM macros. If this check box is not selected, all XLM macros are disabled and users are not notified.\n\nXLM macros cannot be signed and will be disabled if “Disable VBA macros except digitally signed macros” is chosen.\n\nIf you have enabled the “Prevent Excel from running XLM macros” policy setting, XLM macros cannot be run in Excel regardless of how you have configured this policy setting.\n\nThe following section only applies to VBA macros:\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running.\n\nAnd there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: The three check boxes about trusted publishers only apply to Version 2012 and later of Office and Visio. The “Enable Excel 4.0 macros when VBA macros are enabled” check box only applies to Version 2111 and later of Office. None of the check boxes apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases. \n\nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n\nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_VBAWarningsPolicy;L_XL4WarningPolicy","uniqueId":1269,"displayName":"Enable Excel 4.0 macros when VBA macros are enabled","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros or Excel 4.0 (XLM) macros are present. Multiple Office apps support VBA macros, but XLM macros are only supported by Excel.\n\nIf you enable this policy setting, you can choose from four options to determine how the specified applications will warn the user about VBA macros. There is also a check box that determines how Excel will warn the user about XLM macros.\n\nFor VBA macros, these are your choices:\n\n- Disable VBA macros without notification: The application disables VBA macros, whether signed or unsigned, and does not notify users.\n\n- Disable VBA macros with notification: The application displays the Trust Bar for VBA macros, whether signed or unsigned. This option enforces the default configuration in Office.\n\n- Disable VBA macros except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n\n- Enable VBA macros (not recommended): VBA macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n\nIf you disable or don’t configure this policy setting, \"Disable VBA macros with notification\" will be the default setting, and “Enable Excel 4.0 macros when VBA macros are enabled” will be checked. When users open files in the specified applications that contain VBA or XLM macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.\n\nThe following section only applies to Excel 4.0 (XLM) macros:\n\nIf you select the “Enable Excel 4.0 macros when VBA macros are enabled” check box, the setting selected for VBA macros will also apply to XLM macros. If this check box is not selected, all XLM macros are disabled and users are not notified.\n\nXLM macros cannot be signed and will be disabled if “Disable VBA macros except digitally signed macros” is chosen.\n\nIf you have enabled the “Prevent Excel from running XLM macros” policy setting, XLM macros cannot be run in Excel regardless of how you have configured this policy setting.\n\nThe following section only applies to VBA macros:\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running.\n\nAnd there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: The three check boxes about trusted publishers only apply to Version 2012 and later of Office and Visio. The “Enable Excel 4.0 macros when VBA macros are enabled” check box only applies to Version 2111 and later of Office. None of the check boxes apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases. \n\nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n\nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security","registrySubPath":"xl4macrowarningfollowvba","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_WebContentWarningLevel","uniqueId":1521,"displayName":"WEBSERVICE Function Notification Settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_WebContentWarningLevel;L_WebContentWarningLevelValue","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls how Excel will warn users when WEBSERVICE functions are present.\n\nIf you enable this policy setting, you can choose from three options for determining how the specified applications will warn the user about WEBSERVICE functions:\n\n- Disable all with notification:  The application displays the Trust Bar for all WEBSERVICE functions. This option enforces the default configuration in Office.\n- Disable all without notification: The application disables all WEBSERVICE functions and does not notify users.\n- Enable all WEBSERVICE functions (not recommended):  The application enables all WEBSERVICE functions and does not notify users. This option can significantly reduce security by allowing information disclosure to third party web services.\n\nIf you disable this policy setting, the “Disable all with notification” will be the default setting.\nIf you do not configure this policy setting, when users open workbooks that contain WEBSERVICE functions, Excel will open the files with the WEBSERVICE functions disabled and display the Trust Bar with a warning that WEBSERVICE functions are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content,\" then the document is added as a trusted document.","supportedPlatforms":["Windows"],"tags":["Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_WebContentWarningLevel;L_WebContentWarningLevelValue","uniqueId":1520,"displayName":"WEBSERVICE Function Notification Settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable all WEBSERVICE functions (not recommended)","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable all with notification","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable all without notification","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":1,"description":"This policy setting controls how Excel will warn users when WEBSERVICE functions are present.\n\nIf you enable this policy setting, you can choose from three options for determining how the specified applications will warn the user about WEBSERVICE functions:\n\n- Disable all with notification:  The application displays the Trust Bar for all WEBSERVICE functions. This option enforces the default configuration in Office.\n- Disable all without notification: The application disables all WEBSERVICE functions and does not notify users.\n- Enable all WEBSERVICE functions (not recommended):  The application enables all WEBSERVICE functions and does not notify users. This option can significantly reduce security by allowing information disclosure to third party web services.\n\nIf you disable this policy setting, the “Disable all with notification” will be the default setting.\nIf you do not configure this policy setting, when users open workbooks that contain WEBSERVICE functions, Excel will open the files with the WEBSERVICE functions disabled and display the Trust Bar with a warning that WEBSERVICE functions are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content,\" then the document is added as a trusted document.","supportedPlatforms":["Windows"],"tags":["Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security","registrySubPath":"webservicefunctionwarnings","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_WebPagesAndExcel2003XMLSpreadsheets","uniqueId":1319,"displayName":"Web pages and Excel 2003 XML spreadsheets","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_WebPagesAndExcel2003XMLSpreadsheets;L_WebPagesAndExcel2003XMLSpreadsheetsDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_WebPagesAndExcel2003XMLSpreadsheets;L_WebPagesAndExcel2003XMLSpreadsheetsDropID","uniqueId":1318,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"htmlandxmlssfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_WindowsinTaskbar","uniqueId":1200,"displayName":"Show all windows in the Taskbar","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"When multiple workbooks are open simultaneously, this determines whether the user will see a single entry for Excel in the taskbar or a separate entry in the taskbar for each open workbook.","supportedPlatforms":["Windows"],"tags":["General","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"showwindowsintaskbar","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_XL4KillSwitchPolicy","uniqueId":1274,"displayName":"Prevent Excel from running XLM macros","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting will prevent Excel from running Excel 4.0 (XLM) macros.\n\nIf you enable this policy setting, XLM macros cannot be run in Excel.\n\nIf you disable or don’t configure this policy setting, XLM macros can be run in Excel.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security","registrySubPath":"xl4macrooff","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_XMLFiles","uniqueId":1321,"displayName":"XML files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"excel16;L_XMLFiles;L_XMLFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"excel16;L_XMLFiles;L_XMLFilesDropID","uniqueId":1320,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Excel files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Excel Options","Microsoft Excel 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"xmlfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"excel16;L_ZoomonrollwithIntelliMouse","uniqueId":1457,"displayName":"Zoom on roll with IntelliMouse","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting sets the \"Zoom on roll with IntelliMouse'\" option found under File tab | Options | Advanced | Editing options\n\nIf you enable this policy setting, rolling the mouse wheel will change the zoom level of the worksheet.\n\nIf you disable or do not configure this policy setting, rolling the mouse wheel will scroll the worksheet. This is the default behavior.","supportedPlatforms":["Windows"],"tags":["Advanced","Excel Options","Microsoft Excel 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options\\binaryoptions","registrySubPath":"frollzoom_98_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"feedback;L_SendPublicFeedback","uniqueId":5389,"displayName":"Allow users to access the feedback portal","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can access the feedback portal (https://feedbackportal.microsoft.com/feedback/).\n\nThe feedback portal allows users to view, edit, delete, track and follow up on any feedback they have provided to Microsoft through both the in-app feedback mechanisms in Microsoft 365 products and community forums. Users can also get notifications, if they have opted in, when there are any changes related to their feedback and follow-up on their feedback with Microsoft.\n\nThe feedback portal also allows users to participate in public community feedback about their experiences with Microsoft products and perform actions such as upvoting, commenting and posting public community feedback. Microsoft will use this feedback to improve the product for users.\n\nNote: You can't control or manage the information that your users post to the feedback portal. Your users can manage any feedback they have submitted to Microsoft through the feedback portal.\n\nIf you enable this policy setting, your users will be able to access the feedback portal.\n\nIf you disable this policy setting, your users will not be able to access the feedback portal or follow-up on their feedback.\n\nIf you don't configure this policy setting, users will be able to access the feedback portal.\n\nAs an admin, you can also see feedback data collected from users in your tenant under the Health > Feedback node in the Microsoft 365 admin center.\n\nFor more information, see https://docs.microsoft.com/microsoft-365/admin/misc/feedback-user-control.\n","supportedPlatforms":["Web"],"tags":["PublicFeedback","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\feedback","registrySubPath":"L_SendPublicFeedback","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"lync16;L_PolicyConfigurationMode_1","uniqueId":5191,"displayName":"Specify server","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"lync16;L_PolicyConfigurationMode_1;L_ServerAddressInternal_VALUE","logicalOperator":"exists","values":null},{"dependee":"lync16;L_PolicyConfigurationMode_1;L_ServerAddressExternal_VALUE","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nSpecifies how Microsoft Lync identifies the server.\n\nIf you enable this policy setting, you must specify the server name that Microsoft Lync uses.\n\nIf you disable this policy setting, Microsoft Lync uses a DNS lookup to identify the server.\n\nIf you do not configure this policy setting, the user can choose automatic configuration, or the user can specify the name of the server in Microsoft Lync user preferences. To set the user preferences, from the Microsoft Lync Tools menu, click Options, click the Personal tab, within the SIP Communications My Account area click Advanced, select Configure Settings, type the server name in the Server name field.\n\nNote: You can configure this policy setting under both Computer Configuration and User Configuration, but the policy setting under Computer Configuration takes precedence.\n      ","supportedPlatforms":["Windows"],"tags":["Microsoft Lync Feature Policies","Skype for Business 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\lync","registrySubPath":"configurationmode","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"lync16;L_PolicyConfigurationMode_1;L_ServerAddressExternal_VALUE","uniqueId":5190,"displayName":"DNS name of the external server","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"\nSpecifies how Microsoft Lync identifies the server.\n\nIf you enable this policy setting, you must specify the server name that Microsoft Lync uses.\n\nIf you disable this policy setting, Microsoft Lync uses a DNS lookup to identify the server.\n\nIf you do not configure this policy setting, the user can choose automatic configuration, or the user can specify the name of the server in Microsoft Lync user preferences. To set the user preferences, from the Microsoft Lync Tools menu, click Options, click the Personal tab, within the SIP Communications My Account area click Advanced, select Configure Settings, type the server name in the Server name field.\n\nNote: You can configure this policy setting under both Computer Configuration and User Configuration, but the policy setting under Computer Configuration takes precedence.\n      ","supportedPlatforms":["Windows"],"tags":["Microsoft Lync Feature Policies","Skype for Business 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\lync","registrySubPath":"serveraddressexternal","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"lync16;L_PolicyConfigurationMode_1;L_ServerAddressInternal_VALUE","uniqueId":5189,"displayName":"DNS name of the internal server","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"\nSpecifies how Microsoft Lync identifies the server.\n\nIf you enable this policy setting, you must specify the server name that Microsoft Lync uses.\n\nIf you disable this policy setting, Microsoft Lync uses a DNS lookup to identify the server.\n\nIf you do not configure this policy setting, the user can choose automatic configuration, or the user can specify the name of the server in Microsoft Lync user preferences. To set the user preferences, from the Microsoft Lync Tools menu, click Options, click the Personal tab, within the SIP Communications My Account area click Advanced, select Configure Settings, type the server name in the Server name field.\n\nNote: You can configure this policy setting under both Computer Configuration and User Configuration, but the policy setting under Computer Configuration takes precedence.\n      ","supportedPlatforms":["Windows"],"tags":["Microsoft Lync Feature Policies","Skype for Business 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\lync","registrySubPath":"serveraddressinternal","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"lync16;L_PolicyConfiguredServerCheckValues_1;L_ConfiguredServerCheckValues_VALUE","uniqueId":5200,"displayName":"Server version names (semicolon separated list):","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"\nSpecify a semicolon separated list of server version names, e.g. RTC/2.9;RTC/3.0;RTC/4.0, to which Microsoft Lync allows logon in addition to the server versions that are supported by default. Space character is treated as part of the version string.\n      ","supportedPlatforms":["Windows"],"tags":["Microsoft Lync Feature Policies","Skype for Business 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\lync","registrySubPath":"configuredservercheckvalues","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"lync16;L_PolicyConfiguredServerCheckValues_1","uniqueId":5201,"displayName":"Additional server versions supported","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"lync16;L_PolicyConfiguredServerCheckValues_1;L_ConfiguredServerCheckValues_VALUE","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nSpecify a semicolon separated list of server version names, e.g. RTC/2.9;RTC/3.0;RTC/4.0, to which Microsoft Lync allows logon in addition to the server versions that are supported by default. Space character is treated as part of the version string.\n      ","supportedPlatforms":["Windows"],"tags":["Microsoft Lync Feature Policies","Skype for Business 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"lync16;L_PolicyDisableAutomaticSendTracing_1","uniqueId":5203,"displayName":"Disable automatic upload of sign-in failure logs","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nUploads the sign-in failure logs to the Microsoft Lync Server automatically for analysis.  No logs will be automatically uploaded if sign-in is successful.\n\nIf this policy is not configured, then the following happens: \nFor Lync Online Users:  Sign-in failure logs are automatically uploaded.\nFor Lync On-Premise Users:  A confirmation seeking consent from the user is shown before upload.\n\nWhen this is disabled, sign-in logs would be uploaded to the Microsoft Lync Server for both Lync On-Premise and Online users automatically.\n\nWhen this is enabled, sign-in logs will never be uploaded automatically.\n      ","supportedPlatforms":["Windows"],"tags":["Microsoft Lync Feature Policies","Skype for Business 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\lync","registrySubPath":"disableautomaticsendtracing","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"lync16;L_PolicyDisableHttpConnect_1","uniqueId":5198,"displayName":"Disable HTTP fallback for SIP connection","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Prevents from HTTP being used for SIP connection in case TLS or TCP fail.","supportedPlatforms":["Windows"],"tags":["Microsoft Lync Feature Policies","Skype for Business 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\lync","registrySubPath":"disablehttpconnect","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"lync16;L_PolicyDisableNTCredentials_1","uniqueId":5197,"displayName":"Require logon credentials","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nRequires the user to provide logon credentials for Microsoft Lync rather than automatically using the Windows credentials when Microsoft Lync authenticates the user using NTLM or Kerberos.\n\nIf you enable this policy setting, Microsoft Lync requires the user to provide logon credentials.\n\nIf you disable or do not configure this policy setting, Microsoft Lync authenticates the user based on the logon credentials for Windows.\n\nNote: You can configure this policy setting under both Computer Configuration and User Configuration, but the policy setting under Computer Configuration takes precedence.\n      ","supportedPlatforms":["Windows"],"tags":["Microsoft Lync Feature Policies","Skype for Business 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\lync","registrySubPath":"disablentcredentials","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"lync16;L_PolicyDisableServerCheck_1","uniqueId":5199,"displayName":"Disable server version check","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Prevents Microsoft Lync from checking the server version before signing in.","supportedPlatforms":["Windows"],"tags":["Microsoft Lync Feature Policies","Skype for Business 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\lync","registrySubPath":"disableservercheck","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"lync16;L_PolicyEnableBitsForGalDownload_1","uniqueId":5202,"displayName":"Enable using BITS to download Address Book Service files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy allows Microsoft Lync to use BITS (Background Intelligent Transfer Service) to download the Address Book Services files.","supportedPlatforms":["Windows"],"tags":["Microsoft Lync Feature Policies","Skype for Business 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\lync","registrySubPath":"enablebitsforgaldownload","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"lync16;L_PolicyEnableSIPHighSecurityMode_1","uniqueId":5192,"displayName":"Configure SIP security mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nWhen Lync connects to the server, it supports various authentication mechanisms.  This policy allows the user to specify whether Digest and Basic authentication are supported.\n\nDisabled (default):  NTLM/Kerberos/TLS-DSK/Digest/Basic\nEnabled:\n  Authentication mechanisms:  NTLM/Kerberos/TLS-DSK\n  Gal Download: Requires HTTPS if user is not logged in as an internal user.\n      ","supportedPlatforms":["Windows"],"tags":["Microsoft Lync Feature Policies","Skype for Business 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\lync","registrySubPath":"enablesiphighsecuritymode","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"lync16;L_PolicyGalDownloadInitialDelay_1;L_GalDownloadInitialDelay_VALUE","uniqueId":5206,"displayName":"The maximum possible number of minutes to delay download.  Must be greater than or equal to zero","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":"undefined"},"dataType":"Integer"},"description":"\nWhen set, this will delay the initial download of the Global Address Book by a random number between 0 and the number of minutes specified after sign-in.  When the value is 0, the download will begin immediately after sign-in.  By default, the value is 60.  This means that there will be a random delay between 0 and 60 minutes after sign-in before Lync begins to download the address book.\n      ","supportedPlatforms":["Windows"],"tags":["Microsoft Lync Feature Policies","Skype for Business 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\lync","registrySubPath":"galdownloadinitialdelay","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"lync16;L_PolicyGalDownloadInitialDelay_1","uniqueId":5207,"displayName":"Global Address Book Download Initial Delay","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"lync16;L_PolicyGalDownloadInitialDelay_1;L_GalDownloadInitialDelay_VALUE","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nWhen set, this will delay the initial download of the Global Address Book by a random number between 0 and the number of minutes specified after sign-in.  When the value is 0, the download will begin immediately after sign-in.  By default, the value is 60.  This means that there will be a random delay between 0 and 60 minutes after sign-in before Lync begins to download the address book.\n      ","supportedPlatforms":["Windows"],"tags":["Microsoft Lync Feature Policies","Skype for Business 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"lync16;L_PolicyPreventRun_1","uniqueId":5195,"displayName":"Prevent users from running Microsoft Lync","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nPrevents users from running Microsoft Lync.\n\nIf you enable this policy setting, users cannot run Microsoft Lync.\n\nIf you disable or do not configure this policy setting, users can run Microsoft Lync.\n\nNote: You can configure this policy setting under both Computer Configuration and User Configuration, but the policy setting under Computer Configuration takes precedence.\n      ","supportedPlatforms":["Windows"],"tags":["Microsoft Lync Feature Policies","Skype for Business 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\lync","registrySubPath":"preventrun","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"lync16;L_PolicySavePassword_1","uniqueId":5196,"displayName":"Allow storage of user passwords","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nAllows Microsoft Lync to store user passwords.\n\nIf you enable this policy setting, Microsoft Lync can store a password on request from the user.\n\nIf you disable this policy setting, Microsoft Lync cannot store a password.\n\nIf you do not configure this policy setting and the user logs on to a domain, Microsoft Lync does not store the password. If you do not configure this policy setting and the user does not log on to a domain (for example, if the user logs on to a workgroup), Microsoft Lync can store the password.\n\nNote: You can configure this policy setting under both Computer Configuration and User Configuration, but the policy setting under Computer Configuration takes precedence.\n      ","supportedPlatforms":["Windows"],"tags":["Microsoft Lync Feature Policies","Skype for Business 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\lync","registrySubPath":"savepassword","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"lync16;L_PolicySipCompression_1;L_PolicySipCompression","uniqueId":5193,"displayName":"Configure SIP compression mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Always disabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Always enabled","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Based on adaptor speed (default)","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Based on ping round-trip time","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"\nDefines when to turn on SIP compression. Default: Based on adaptor speed.\n\nSetting this policy may cause an increase in sign-in time.\n      ","supportedPlatforms":["Windows"],"tags":["Microsoft Lync Feature Policies","Skype for Business 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\lync","registrySubPath":"sipcompression","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"lync16;L_PolicySipCompression_1","uniqueId":5194,"displayName":"Configure SIP compression mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"lync16;L_PolicySipCompression_1;L_PolicySipCompression","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nDefines when to turn on SIP compression. Default: Based on adaptor speed.\n\nSetting this policy may cause an increase in sign-in time.\n      ","supportedPlatforms":["Windows"],"tags":["Microsoft Lync Feature Policies","Skype for Business 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"lync16;L_PolicyTrustModelData_1","uniqueId":5205,"displayName":"Trusted Domain List","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"lync16;L_PolicyTrustModelData_1;L_TrustModelData_VALUE","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nWhen Lync connects to an unknown domain, it needs explicit user consent.  A dialog is shown asking the user for confirmation on whether it should continue.\n\nThis policy gives administrators the ability to provide trusted domain names.  If a domain name is added to this list, Lync will trust that domain and will not show the dialog requesting permission.  Multiple domain addresses as comma separated values can be provided.\n\nBy setting this policy, Lync will not explicitly trust the default domains specified below.  It will exclusively trust the domain specified by the policy.\n\nSupported values:\n  Not Configured (Default)/Disabled:  By default the following domains will be trusted:  \"lync.com, outlook.com, lync.glbdns.microsoft.com, and microsoftonline.com.\"\n  Enabled:  The list of domains to be trusted.  For example: \"contoso.com, contoso.co.in\"\n      ","supportedPlatforms":["Windows"],"tags":["Microsoft Lync Feature Policies","Skype for Business 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"lync16;L_PolicyTrustModelData_1;L_TrustModelData_VALUE","uniqueId":5204,"displayName":"Trusted Domains (comma separated list):","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"\nWhen Lync connects to an unknown domain, it needs explicit user consent.  A dialog is shown asking the user for confirmation on whether it should continue.\n\nThis policy gives administrators the ability to provide trusted domain names.  If a domain name is added to this list, Lync will trust that domain and will not show the dialog requesting permission.  Multiple domain addresses as comma separated values can be provided.\n\nBy setting this policy, Lync will not explicitly trust the default domains specified below.  It will exclusively trust the domain specified by the policy.\n\nSupported values:\n  Not Configured (Default)/Disabled:  By default the following domains will be trusted:  \"lync.com, outlook.com, lync.glbdns.microsoft.com, and microsoftonline.com.\"\n  Enabled:  The list of domains to be trusted.  For example: \"contoso.com, contoso.co.in\"\n      ","supportedPlatforms":["Windows"],"tags":["Microsoft Lync Feature Policies","Skype for Business 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\lync","registrySubPath":"trustmodeldata","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_3PStorageProvidersForCopilot","uniqueId":5308,"displayName":"Enable Third Party Storage Provider Connections","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_3PStorageProvidersForCopilot;L_3PStorageProvidersForCopilotOptions","logicalOperator":"exists","values":[]}],"logicalOperator":1}}]},"dataType":"Composite"},"description":"Defines trusted combinations of third party storage providers (Box/Dropbox/etc) and their associated 3rd party tenant IDs for enterprise customers. Prevents unauthorized or mismatched connections between Microsoft enterprise tenants and 3rd party storage providers.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["3PStorageProvidersForCopilot","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_3PStorageProvidersForCopilot;L_3PStorageProvidersForCopilotOptions","uniqueId":5309,"displayName":"List of storage providers:","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"Defines trusted combinations of third party storage providers (Box/Dropbox/etc) and their associated 3rd party tenant IDs for enterprise customers. Prevents unauthorized or mismatched connections between Microsoft enterprise tenants and 3rd party storage providers.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["3PStorageProvidersForCopilot","Cloud Policies Collection","Cloud Policies Composite","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\storageproviders","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_AcceptAllEulas","uniqueId":2879,"displayName":"Accept all EULAs","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, users are required to accept a EULA upon activating an Office license. By setting this policy, all EULAs will be automatically accepted machine-wide and no prompts will be shown.","supportedPlatforms":["Windows"],"tags":["Trust Center","Privacy","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\registration","registrySubPath":"acceptalleulaspolicy","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ActivateRestrictedBrowsing;L_Access","uniqueId":1630,"displayName":"Microsoft Access","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"When Restricted Browsing is activated the save as dialog box will be restricted such that the user will only be able to navigate to those locations and the children of those locations specified in the \"Restricted Browsing\\Approve Locations\" policy setting.  If you want to enable the \"Approve Locations\" policy setting, you must first enable the \"Approve Locations\" policy setting first.","supportedPlatforms":["Windows"],"tags":["Restricted Browsing","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\restrictedbrowse\\optin","registrySubPath":"microsoft access","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ActivateRestrictedBrowsing","uniqueId":1641,"displayName":"Activate Restricted Browsing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ActivateRestrictedBrowsing;L_Access","logicalOperator":"exists","values":null},{"dependee":"office16;L_ActivateRestrictedBrowsing;L_Excel","logicalOperator":"exists","values":null},{"dependee":"office16;L_ActivateRestrictedBrowsing;L_SharePoint","logicalOperator":"exists","values":null},{"dependee":"office16;L_ActivateRestrictedBrowsing;L_InfoPath","logicalOperator":"exists","values":null},{"dependee":"office16;L_ActivateRestrictedBrowsing;L_OneNote","logicalOperator":"exists","values":null},{"dependee":"office16;L_ActivateRestrictedBrowsing;L_Outlook","logicalOperator":"exists","values":null},{"dependee":"office16;L_ActivateRestrictedBrowsing;L_PowerPoint","logicalOperator":"exists","values":null},{"dependee":"office16;L_ActivateRestrictedBrowsing;L_Project","logicalOperator":"exists","values":null},{"dependee":"office16;L_ActivateRestrictedBrowsing;L_Publisher","logicalOperator":"exists","values":null},{"dependee":"office16;L_ActivateRestrictedBrowsing;L_Visio","logicalOperator":"exists","values":null},{"dependee":"office16;L_ActivateRestrictedBrowsing;L_Word","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"When Restricted Browsing is activated the save as dialog box will be restricted such that the user will only be able to navigate to those locations and the children of those locations specified in the \"Restricted Browsing\\Approve Locations\" policy setting.  If you want to enable the \"Approve Locations\" policy setting, you must first enable the \"Approve Locations\" policy setting first.","supportedPlatforms":["Windows"],"tags":["Restricted Browsing","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ActivateRestrictedBrowsing;L_Excel","uniqueId":1631,"displayName":"Microsoft Excel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"When Restricted Browsing is activated the save as dialog box will be restricted such that the user will only be able to navigate to those locations and the children of those locations specified in the \"Restricted Browsing\\Approve Locations\" policy setting.  If you want to enable the \"Approve Locations\" policy setting, you must first enable the \"Approve Locations\" policy setting first.","supportedPlatforms":["Windows"],"tags":["Restricted Browsing","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\restrictedbrowse\\optin","registrySubPath":"microsoft excel","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ActivateRestrictedBrowsing;L_InfoPath","uniqueId":1633,"displayName":"Microsoft InfoPath","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"When Restricted Browsing is activated the save as dialog box will be restricted such that the user will only be able to navigate to those locations and the children of those locations specified in the \"Restricted Browsing\\Approve Locations\" policy setting.  If you want to enable the \"Approve Locations\" policy setting, you must first enable the \"Approve Locations\" policy setting first.","supportedPlatforms":["Windows"],"tags":["Restricted Browsing","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\restrictedbrowse\\optin","registrySubPath":"microsoft infopath","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ActivateRestrictedBrowsing;L_OneNote","uniqueId":1634,"displayName":"Microsoft OneNote","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"When Restricted Browsing is activated the save as dialog box will be restricted such that the user will only be able to navigate to those locations and the children of those locations specified in the \"Restricted Browsing\\Approve Locations\" policy setting.  If you want to enable the \"Approve Locations\" policy setting, you must first enable the \"Approve Locations\" policy setting first.","supportedPlatforms":["Windows"],"tags":["Restricted Browsing","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\restrictedbrowse\\optin","registrySubPath":"microsoft onenote","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ActivateRestrictedBrowsing;L_Outlook","uniqueId":1635,"displayName":"Microsoft Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"When Restricted Browsing is activated the save as dialog box will be restricted such that the user will only be able to navigate to those locations and the children of those locations specified in the \"Restricted Browsing\\Approve Locations\" policy setting.  If you want to enable the \"Approve Locations\" policy setting, you must first enable the \"Approve Locations\" policy setting first.","supportedPlatforms":["Windows"],"tags":["Restricted Browsing","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\restrictedbrowse\\optin","registrySubPath":"microsoft outlook","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ActivateRestrictedBrowsing;L_PowerPoint","uniqueId":1636,"displayName":"Microsoft PowerPoint","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"When Restricted Browsing is activated the save as dialog box will be restricted such that the user will only be able to navigate to those locations and the children of those locations specified in the \"Restricted Browsing\\Approve Locations\" policy setting.  If you want to enable the \"Approve Locations\" policy setting, you must first enable the \"Approve Locations\" policy setting first.","supportedPlatforms":["Windows"],"tags":["Restricted Browsing","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\restrictedbrowse\\optin","registrySubPath":"microsoft powerpoint","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ActivateRestrictedBrowsing;L_Project","uniqueId":1637,"displayName":"Microsoft Project","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"When Restricted Browsing is activated the save as dialog box will be restricted such that the user will only be able to navigate to those locations and the children of those locations specified in the \"Restricted Browsing\\Approve Locations\" policy setting.  If you want to enable the \"Approve Locations\" policy setting, you must first enable the \"Approve Locations\" policy setting first.","supportedPlatforms":["Windows"],"tags":["Restricted Browsing","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\restrictedbrowse\\optin","registrySubPath":"microsoft project","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ActivateRestrictedBrowsing;L_Publisher","uniqueId":1638,"displayName":"Microsoft Publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"When Restricted Browsing is activated the save as dialog box will be restricted such that the user will only be able to navigate to those locations and the children of those locations specified in the \"Restricted Browsing\\Approve Locations\" policy setting.  If you want to enable the \"Approve Locations\" policy setting, you must first enable the \"Approve Locations\" policy setting first.","supportedPlatforms":["Windows"],"tags":["Restricted Browsing","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\restrictedbrowse\\optin","registrySubPath":"microsoft publisher","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ActivateRestrictedBrowsing;L_SharePoint","uniqueId":1632,"displayName":"Microsoft SharePoint Designer","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"When Restricted Browsing is activated the save as dialog box will be restricted such that the user will only be able to navigate to those locations and the children of those locations specified in the \"Restricted Browsing\\Approve Locations\" policy setting.  If you want to enable the \"Approve Locations\" policy setting, you must first enable the \"Approve Locations\" policy setting first.","supportedPlatforms":["Windows"],"tags":["Restricted Browsing","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\restrictedbrowse\\optin","registrySubPath":"microsoft sharepoint designer","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ActivateRestrictedBrowsing;L_Visio","uniqueId":1639,"displayName":"Microsoft Visio","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"When Restricted Browsing is activated the save as dialog box will be restricted such that the user will only be able to navigate to those locations and the children of those locations specified in the \"Restricted Browsing\\Approve Locations\" policy setting.  If you want to enable the \"Approve Locations\" policy setting, you must first enable the \"Approve Locations\" policy setting first.","supportedPlatforms":["Windows"],"tags":["Restricted Browsing","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\restrictedbrowse\\optin","registrySubPath":"microsoft visio","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ActivateRestrictedBrowsing;L_Word","uniqueId":1640,"displayName":"Microsoft Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"When Restricted Browsing is activated the save as dialog box will be restricted such that the user will only be able to navigate to those locations and the children of those locations specified in the \"Restricted Browsing\\Approve Locations\" policy setting.  If you want to enable the \"Approve Locations\" policy setting, you must first enable the \"Approve Locations\" policy setting first.","supportedPlatforms":["Windows"],"tags":["Restricted Browsing","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\restrictedbrowse\\optin","registrySubPath":"microsoft word","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ActiveDirectorytimeoutforqueryingoneentryforgroupexpansion","uniqueId":2498,"displayName":"Active Directory timeout for querying one entry for group expansion","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ActiveDirectorytimeoutforqueryingoneentryforgroupexpansion;L_Entertimeoutinseconds","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the timeout value for querying one Active Directory entry for group expansion.","supportedPlatforms":["Windows"],"tags":["Manage Restricted Permissions","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ActiveDirectorytimeoutforqueryingoneentryforgroupexpansion;L_Entertimeoutinseconds","uniqueId":2497,"displayName":"Enter timeout in seconds:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":640},"dataType":"Integer"},"description":"Specifies the timeout value for querying one Active Directory entry for group expansion.","supportedPlatforms":["Windows"],"tags":["Manage Restricted Permissions","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\drm\\autoexpanddls","registrySubPath":"adssearchpreftimeoutsecs","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ActiveXControlInitialization","uniqueId":2008,"displayName":"ActiveX Control Initialization","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ActiveXControlInitialization;L_ActiveXControlInitializationcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the Microsoft ActiveX® initialization security level for all Microsoft Office applications. ActiveX controls can adversely affect a computer directly. In addition, malicious code can be used to compromise an ActiveX control and attack a computer. To indicate the safety of an ActiveX control, developers can denote them as Safe For Initialization (SFI). SFI indicates that a control is safe to open and run, and that it is not capable of causing a problem for any computer, regardless of whether it has persisted data values or not. If a control is not marked SFI, it is possible that the control could adversely affect a computer--or it could mean that the developers did not test the control in all situations and are not sure whether it might be compromised in the future. \n \n If you enable this policy setting, you can set the ActiveX security level to a number between 1 and 6. These security levels are as follows: \n \n 1 - Regardless of how the control is marked, load it and use the persisted values (if any). This setting does not prompt the user. \n \n 2 - If SFI, load the control in safe mode and use persisted values (if any). If not SFI, load in unsafe mode with persisted values (if any), or use the default (first-time initialization) settings. This level is similar to the default configuration, but does not prompt the user. \n \n 3 - If SFI, load the control in unsafe mode and use persisted values (if any). If not SFI, prompt the user and advise them that it is marked unsafe. If the user chooses No at the prompt, do not load the control. Otherwise, load it with default (first-time initialization) settings. \n \n 4 - If SFI, load the control in safe mode and use persisted values (if any). If not SFI, prompt the user and advise them that it is marked unsafe. If the user chooses No at the prompt, do not load the control. Otherwise, load it with default (first-time initialization) settings. \n \n 5 - If SFI, load the control in unsafe mode and use persisted values (if any). If not SFI, prompt the user and advise them that it is marked unsafe. If the user chooses No at the prompt, do not load the control. Otherwise, load it with persisted values.  \n \n 6 - If SFI, load the control in safe mode and use persisted values (if any). If not SFI, prompt the user and advise them that it is marked unsafe. If the user chooses No at the prompt, do not load the control. Otherwise, load it with persisted values. \n \n If you disable or do not configure this policy setting, if a control is marked SFI, the application loads the control in safe mode and uses persisted values (if any). If the control is not marked SFI, the application loads the control in unsafe mode with persisted values (if any), or uses the default (first-time initialization) settings. In both situations, the Message Bar informs users that the controls have been disabled and prompts them to respond. \n \n Important - Some ActiveX controls do not respect the safe mode registry setting, and therefore might load persisted data even though you configure this setting to instruct the control to use safe mode. This setting only increases security for ActiveX controls that are accurately marked as SFI. In situations that involve malicious or poorly designed code, an ActiveX control might be inaccurately marked as SFI.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ActiveXControlInitialization;L_ActiveXControlInitializationcolon","uniqueId":2007,"displayName":"ActiveX Control Initialization:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"2","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"3","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"4","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"5","description":"","tags":[],"dependencyGroup":null},{"value":6,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"6","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":6,"recommendation":"security"}],"defaultValue":1,"description":"This policy setting specifies the Microsoft ActiveX® initialization security level for all Microsoft Office applications. ActiveX controls can adversely affect a computer directly. In addition, malicious code can be used to compromise an ActiveX control and attack a computer. To indicate the safety of an ActiveX control, developers can denote them as Safe For Initialization (SFI). SFI indicates that a control is safe to open and run, and that it is not capable of causing a problem for any computer, regardless of whether it has persisted data values or not. If a control is not marked SFI, it is possible that the control could adversely affect a computer--or it could mean that the developers did not test the control in all situations and are not sure whether it might be compromised in the future. \n \n If you enable this policy setting, you can set the ActiveX security level to a number between 1 and 6. These security levels are as follows: \n \n 1 - Regardless of how the control is marked, load it and use the persisted values (if any). This setting does not prompt the user. \n \n 2 - If SFI, load the control in safe mode and use persisted values (if any). If not SFI, load in unsafe mode with persisted values (if any), or use the default (first-time initialization) settings. This level is similar to the default configuration, but does not prompt the user. \n \n 3 - If SFI, load the control in unsafe mode and use persisted values (if any). If not SFI, prompt the user and advise them that it is marked unsafe. If the user chooses No at the prompt, do not load the control. Otherwise, load it with default (first-time initialization) settings. \n \n 4 - If SFI, load the control in safe mode and use persisted values (if any). If not SFI, prompt the user and advise them that it is marked unsafe. If the user chooses No at the prompt, do not load the control. Otherwise, load it with default (first-time initialization) settings. \n \n 5 - If SFI, load the control in unsafe mode and use persisted values (if any). If not SFI, prompt the user and advise them that it is marked unsafe. If the user chooses No at the prompt, do not load the control. Otherwise, load it with persisted values.  \n \n 6 - If SFI, load the control in safe mode and use persisted values (if any). If not SFI, prompt the user and advise them that it is marked unsafe. If the user chooses No at the prompt, do not load the control. Otherwise, load it with persisted values. \n \n If you disable or do not configure this policy setting, if a control is marked SFI, the application loads the control in safe mode and uses persisted values (if any). If the control is not marked SFI, the application loads the control in unsafe mode with persisted values (if any), or uses the default (first-time initialization) settings. In both situations, the Message Bar informs users that the controls have been disabled and prompts them to respond. \n \n Important - Some ActiveX controls do not respect the safe mode registry setting, and therefore might load persisted data even though you configure this setting to instruct the control to use safe mode. This setting only increases security for ActiveX controls that are accurately marked as SFI. In situations that involve malicious or poorly designed code, an ActiveX control might be inaccurately marked as SFI.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\security","registrySubPath":"uficontrols","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ADAttributecontaingpersonalsiteURL","uniqueId":2541,"displayName":"AD attribute containing Personal Site URL","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ADAttributecontaingpersonalsiteURL;L_empty424","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The Office client updates the User object in the Active Directory with the URL of the user's personal site. Please enter the attribute of the user object which Office should update. The default is \"wwwHomePage\".","supportedPlatforms":["Windows"],"tags":["Server Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ADAttributecontaingpersonalsiteURL;L_empty424","uniqueId":2540,"displayName":"AD attribute containing Personal Site URL","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The Office client updates the User object in the Active Directory with the URL of the user's personal site. Please enter the attribute of the user object which Office should update. The default is \"wwwHomePage\".","supportedPlatforms":["Windows"],"tags":["Server Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\portal","registrySubPath":"adpesonalsiteproperty","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_AddInContentCollection","uniqueId":5310,"displayName":"Send the name and identifiers of private add-ins used by Office to Microsoft","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy setting allows you to control whether the name and identifiers of private add-ins used by Office are collected and sent to Microsoft. Private add-ins are add-ins developed by organizations for internal use only and are used only by Office users within the organization.\n\nCollecting data about a private add-in, including the name and identifiers, helps Microsoft detect and diagnose issues where an add-in may be causing Office to crash, perform poorly, or behave in an unexpected manner.\n\nNote: This policy setting only applies to add-ins that are loaded by an Office app, such as Word or Excel.\n\nThis policy setting doesn't apply to publicly available add-ins used by Office. Information about those add-ins, including the name and identifiers, may be collected and sent to Microsoft regardless of how you configure this policy setting.\n\nIf you enable this policy setting, the name and identifiers of private add-ins will be collected and sent to Microsoft.\n\nIf you disable or don't configure this policy setting, the name and identifiers of private add-ins won't be collected and won't be sent to Microsoft.\n\nNote: Even if you disable or don't configure this policy setting, some generic information about private add-ins will be collected and sent to Microsoft. For example, when the add-in was added to or loaded by the Office app. But that generic information won't contain the names and identifiers of those private add-ins.\n\nFor more information, see https://go.microsoft.com/fwlink/p/?linkid=2162365.\n","supportedPlatforms":["Windows"],"tags":["Privacy","Cloud Policies Boolean","Cloud Policies","ContentCollection"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\privacy","registrySubPath":"addincontentdisabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AdditionalpermissionsrequestURL","uniqueId":2492,"displayName":"Additional permissions request URL","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AdditionalpermissionsrequestURL;L_ChecktospecifyacustomURLoremailaddress","logicalOperator":"exists","values":null},{"dependee":"office16;L_AdditionalpermissionsrequestURL;L_SpecifyURLEmailaddress","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies a location where a user can obtain more information about getting access to IRM content.","supportedPlatforms":["Windows"],"tags":["Manage Restricted Permissions","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AdditionalpermissionsrequestURL;L_ChecktospecifyacustomURLoremailaddress","uniqueId":2490,"displayName":"Check to specify a custom URL or e-mail address","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Specifies a location where a user can obtain more information about getting access to IRM content.","supportedPlatforms":["Windows"],"tags":["Manage Restricted Permissions","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\drm","registrySubPath":"requestpermission","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AdditionalpermissionsrequestURL;L_SpecifyURLEmailaddress","uniqueId":2491,"displayName":"Specify URL/Email address:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specifies a location where a user can obtain more information about getting access to IRM content.","supportedPlatforms":["Windows"],"tags":["Manage Restricted Permissions","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\drm","registrySubPath":"requestpermissionurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_Afrikaans","uniqueId":2044,"displayName":"Afrikaans","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Afrikaans","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"af-za","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AgeOutPolicyIncludingFilesPendingUpload","uniqueId":1544,"displayName":"Age out documents older than n days Including documents with pending uploads","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AgeOutPolicyIncludingFilesPendingUpload;L_AgeOutPolicyIncludingFilesPendingUploadDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\n          This policy controls when locally cached Office documents are aged out of the Office Document Cache including if the file may have pending uploads. This acts as a maximum possible age (in days) for any file to remain in the Office Document Cache.\n\n          If you enable this policy setting, files older than the policy \"Age out documents older than n days\" as well as this setting will get cleaned up regardless of file pending upload status.\n\n          If you disable this policy setting or if you do not configure this policy setting, Office will clean out only files that do not have pending changes per the policy \"Age out documents older than n days\". Configuring this policy with a value of 0 is also considered disabling the policy.\n\n          For more information https://support.microsoft.com/en-us/topic/managing-office-document-cache-size-ea64af72-b597-408e-8ecf-fd55daa02476\n\n          Note: This policy setting only applies to Office builds 19328.20000 and newer\n      ","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AgeOutPolicyIncludingFilesPendingUpload;L_AgeOutPolicyIncludingFilesPendingUploadDecimal","uniqueId":1543,"displayName":"Number of days","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":365},"dataType":"Integer"},"description":"\n          This policy controls when locally cached Office documents are aged out of the Office Document Cache including if the file may have pending uploads. This acts as a maximum possible age (in days) for any file to remain in the Office Document Cache.\n\n          If you enable this policy setting, files older than the policy \"Age out documents older than n days\" as well as this setting will get cleaned up regardless of file pending upload status.\n\n          If you disable this policy setting or if you do not configure this policy setting, Office will clean out only files that do not have pending changes per the policy \"Age out documents older than n days\". Configuring this policy with a value of 0 is also considered disabling the policy.\n\n          For more information https://support.microsoft.com/en-us/topic/managing-office-document-cache-size-ea64af72-b597-408e-8ecf-fd55daa02476\n\n          Note: This policy setting only applies to Office builds 19328.20000 and newer\n      ","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\fileio","registrySubPath":"ageoutpolicyincludingfilespendingupload","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AgeOutPolicyLocalVersioning","uniqueId":1546,"displayName":"Number of days to keep local document versions in the local cache","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AgeOutPolicyLocalVersioning;L_AgeOutPolicyLocalVersioningDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy controls how long local document versions are kept in the local cache. The default setting is 30 days and applies to Word, Excel, and PowerPoint. \n\nIf you enable this policy setting, local document versions will be kept for the number of days specified, after which they’ll be deleted from the local cache. You can configure the setting with a value from 1 to 30.\n\nIf you disable or don’t configure this policy setting, local document versions will be kept for 30 days, after which they’ll be deleted from the local cache.\n      ","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AgeOutPolicyLocalVersioning;L_AgeOutPolicyLocalVersioningDecimal","uniqueId":1545,"displayName":"Number of days","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":30},"dataType":"Integer"},"description":"This policy controls how long local document versions are kept in the local cache. The default setting is 30 days and applies to Word, Excel, and PowerPoint. \n\nIf you enable this policy setting, local document versions will be kept for the number of days specified, after which they’ll be deleted from the local cache. You can configure the setting with a value from 1 to 30.\n\nIf you disable or don’t configure this policy setting, local document versions will be kept for 30 days, after which they’ll be deleted from the local cache.\n      ","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\fileio","registrySubPath":"ageoutpolicylocalversioning","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AgeOutPolicy","uniqueId":1542,"displayName":"Age out documents older than n days","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AgeOutPolicy;L_AgeOutPolicyDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy controls when locally cached Office documents are aged out of the Office Document Cache. This does not include files that may have pending uploads.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AgeOutPolicy;L_AgeOutPolicyDecimal","uniqueId":1541,"displayName":"Number of days","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":14},"dataType":"Integer"},"description":"This policy controls when locally cached Office documents are aged out of the Office Document Cache. This does not include files that may have pending uploads.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\fileio","registrySubPath":"ageoutpolicy","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AIPException","uniqueId":2954,"displayName":"Use the Azure Information Protection add-in for sensitivity labeling","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the Microsoft Azure Information Protection add-in can be used rather than the default of built-in labeling to view and apply sensitivity labels in Office apps. It applies only to subscription versions of Office, such as Microsoft 365 Apps for enterprise.​\n\nIf you enable this policy setting and the Microsoft Azure Information Protection unified labeling client is installed, the add-in from that client replaces the default labeling built into Office apps.\n\nIf you disable this policy setting or don’t configure it, the default labeling experience that’s built-in for Office apps is used to view and apply sensitivity labels.​\n\nFor more information about this setting, see https://go.microsoft.com/fwlink/p/?linkid=2207430.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\labels","registrySubPath":"aipexception","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Albanian","uniqueId":2045,"displayName":"Albanian","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Albanian","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sq-al","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowaccenteduppercaseinFrench","uniqueId":1690,"displayName":"Allow accented uppercase in French","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the option \"Enforce accented uppercase in French\".","supportedPlatforms":["Windows"],"tags":["Tools | Options | Spelling","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\shared tools\\proofing tools\\1.0\\office","registrySubPath":"enforceaccenteduppercase","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedCOMAddins","uniqueId":2936,"displayName":"List of allowed COM/VSTO add-ins registered in HKCU","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedCOMAddins;L_AllowedCOMAddinsList","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify COM/VSTO add-ins registered in HKEY_CURRENT_USER (HKCU) that should be allowed to load, overriding the \"Block loading of COM/VSTO add-ins registered in HKCU\" policy.\n\nSome legitimate add-ins may be installed in HKCU even when deployed by administrators, due to how the independent software vendor (ISV) designed their installer. This policy provides an administrative override to allow specific add-ins to load despite being registered in HKCU.\n\nIf you enable this policy setting, you can specify a list of COM/VSTO add-ins that are allowed to load from HKCU. Enter each add-in using its ProgID as the name.\n\nIf you disable or don't configure this policy setting, the standard HKCU blocking behavior applies when that policy is enabled.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedCOMAddins;L_AllowedCOMAddinsList","uniqueId":2935,"displayName":"Allowed COM/VSTO Add-ins:","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to specify COM/VSTO add-ins registered in HKEY_CURRENT_USER (HKCU) that should be allowed to load, overriding the \"Block loading of COM/VSTO add-ins registered in HKCU\" policy.\n\nSome legitimate add-ins may be installed in HKCU even when deployed by administrators, due to how the independent software vendor (ISV) designed their installer. This policy provides an administrative override to allow specific add-ins to load despite being registered in HKCU.\n\nIf you enable this policy setting, you can specify a list of COM/VSTO add-ins that are allowed to load from HKCU. Enter each add-in using its ProgID as the name.\n\nIf you disable or don't configure this policy setting, the standard HKCU blocking behavior applies when that policy is enabled.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\allowedcomaddins","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_AllowedExtensions","uniqueId":2910,"displayName":"Allow file extensions for OLE embedding","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedExtensions;L_allowedextensionsole","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.​\n\nThis policy setting allows you to specify which file extensions Office won’t block when they are embedded as an OLE package in an Office file by using the Object Packager control.\n\nBy default, Office blocks certain file extensions. For a list of those file extensions, go to https://go.microsoft.com/fwlink/?linkid=847759.\n\nImportant: Malicious scripts and executables can be embedded as an OLE package and can cause harm if clicked by the user.\n\nIf you enable this policy setting, enter the file extensions to allow, separated by semicolons. For example, exe;vbs;js.\n\nIf you disable or don’t configure this policy setting, the default set of file extensions will be blocked.\n\nIf you want to block additional file extensions, enable the \"Block additional file extensions for OLE embedding\" policy setting.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedExtensions;L_allowedextensionsole","uniqueId":2909,"displayName":"File extensions:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.​\n\nThis policy setting allows you to specify which file extensions Office won’t block when they are embedded as an OLE package in an Office file by using the Object Packager control.\n\nBy default, Office blocks certain file extensions. For a list of those file extensions, go to https://go.microsoft.com/fwlink/?linkid=847759.\n\nImportant: Malicious scripts and executables can be embedded as an OLE package and can cause harm if clicked by the user.\n\nIf you enable this policy setting, enter the file extensions to allow, separated by semicolons. For example, exe;vbs;js.\n\nIf you disable or don’t configure this policy setting, the default set of file extensions will be blocked.\n\nIf you want to block additional file extensions, enable the \"Block additional file extensions for OLE embedding\" policy setting.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\security","registrySubPath":"allowedextensions","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_AllowedHateContentGeneralUser","uniqueId":2987,"displayName":"Allowed severity of hate content in general for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedHateContentGeneralUser;L_AllowedHateContentGeneralUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of hate content in general for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no hate content.\n\n7 means allow all hate content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of hate content in general defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of hate content to and from [a specific scenario] for the computer.\n2. Allowed severity of hate content in general for the computer.\n3. Allowed severity of hate content to and from [a specific scenario] for the user.\n4. Allowed severity of hate content in general for the user.","supportedPlatforms":["Windows"],"tags":["General","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedHateContentGeneralUser;L_AllowedHateContentGeneralUserDecimal","uniqueId":2986,"displayName":"Allowed severity of hate content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of hate content in general for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no hate content.\n\n7 means allow all hate content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of hate content in general defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of hate content to and from [a specific scenario] for the computer.\n2. Allowed severity of hate content in general for the computer.\n3. Allowed severity of hate content to and from [a specific scenario] for the user.\n4. Allowed severity of hate content in general for the user.","supportedPlatforms":["Windows"],"tags":["General","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\general","registrySubPath":"allowedhatecontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedHateContentSpecificAlternativeTextUser","uniqueId":3014,"displayName":"Allowed severity of hate content to and from the Alternative Text scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedHateContentSpecificAlternativeTextUser;L_AllowedHateContentSpecificAlternativeTextUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of hate content to and from the Alternative Text scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no hate content.\n\n7 means allow all hate content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of hate content to and from the Alternative Text scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of hate content to and from the Alternative Text scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of hate content to and from the Alternative Text scenario for the computer.\n2. Allowed severity of hate content in general for the computer.\n3. Allowed severity of hate content to and from the Alternative Text scenario for the user.\n4. Allowed severity of hate content in general for the user.","supportedPlatforms":["Windows"],"tags":["Alternative Text","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedHateContentSpecificAlternativeTextUser;L_AllowedHateContentSpecificAlternativeTextUserDecimal","uniqueId":3013,"displayName":"Allowed severity of hate content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of hate content to and from the Alternative Text scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no hate content.\n\n7 means allow all hate content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of hate content to and from the Alternative Text scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of hate content to and from the Alternative Text scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of hate content to and from the Alternative Text scenario for the computer.\n2. Allowed severity of hate content in general for the computer.\n3. Allowed severity of hate content to and from the Alternative Text scenario for the user.\n4. Allowed severity of hate content in general for the user.","supportedPlatforms":["Windows"],"tags":["Alternative Text","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\alternativetext","registrySubPath":"allowedhatecontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedHateContentSpecificImageQuestionAndAnsweringUser","uniqueId":3041,"displayName":"Allowed severity of hate content to and from the Image Question and Answering scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedHateContentSpecificImageQuestionAndAnsweringUser;L_AllowedHateContentSpecificImageQuestionAndAnsweringUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of hate content to and from the Image Question and Answering scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no hate content.\n\n7 means allow all hate content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of hate content to and from the Image Question and Answering scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of hate content to and from the Image Question and Answering scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of hate content to and from the Image Question and Answering scenario for the computer.\n2. Allowed severity of hate content in general for the computer.\n3. Allowed severity of hate content to and from the Image Question and Answering scenario for the user.\n4. Allowed severity of hate content in general for the user.","supportedPlatforms":["Windows"],"tags":["Image Question and Answering","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedHateContentSpecificImageQuestionAndAnsweringUser;L_AllowedHateContentSpecificImageQuestionAndAnsweringUserDecimal","uniqueId":3040,"displayName":"Allowed severity of hate content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of hate content to and from the Image Question and Answering scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no hate content.\n\n7 means allow all hate content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of hate content to and from the Image Question and Answering scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of hate content to and from the Image Question and Answering scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of hate content to and from the Image Question and Answering scenario for the computer.\n2. Allowed severity of hate content in general for the computer.\n3. Allowed severity of hate content to and from the Image Question and Answering scenario for the user.\n4. Allowed severity of hate content in general for the user.","supportedPlatforms":["Windows"],"tags":["Image Question and Answering","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\imagequestionandanswering","registrySubPath":"allowedhatecontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedHateContentSpecificPromptAssistanceUser","uniqueId":3005,"displayName":"Allowed severity of hate content to and from the Prompt Assistance scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedHateContentSpecificPromptAssistanceUser;L_AllowedHateContentSpecificPromptAssistanceUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of hate content to and from the Prompt Assistance scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no hate content.\n\n7 means allow all hate content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of hate content to and from the Prompt Assistance scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of hate content to and from the Prompt Assistance scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of hate content to and from the Prompt Assistance scenario for the computer.\n2. Allowed severity of hate content in general for the computer.\n3. Allowed severity of hate content to and from the Prompt Assistance scenario for the user.\n4. Allowed severity of hate content in general for the user.","supportedPlatforms":["Windows"],"tags":["Prompt Assistance","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedHateContentSpecificPromptAssistanceUser;L_AllowedHateContentSpecificPromptAssistanceUserDecimal","uniqueId":3004,"displayName":"Allowed severity of hate content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of hate content to and from the Prompt Assistance scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no hate content.\n\n7 means allow all hate content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of hate content to and from the Prompt Assistance scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of hate content to and from the Prompt Assistance scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of hate content to and from the Prompt Assistance scenario for the computer.\n2. Allowed severity of hate content in general for the computer.\n3. Allowed severity of hate content to and from the Prompt Assistance scenario for the user.\n4. Allowed severity of hate content in general for the user.","supportedPlatforms":["Windows"],"tags":["Prompt Assistance","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\promptassistance","registrySubPath":"allowedhatecontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedHateContentSpecificRewriteUser","uniqueId":2996,"displayName":"Allowed severity of hate content to and from the Rewrite scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedHateContentSpecificRewriteUser;L_AllowedHateContentSpecificRewriteUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of hate content to and from the Rewrite scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no hate content.\n\n7 means allow all hate content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of hate content to and from the Rewrite scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of hate content to and from the Rewrite scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of hate content to and from the Rewrite scenario for the computer.\n2. Allowed severity of hate content in general for the computer.\n3. Allowed severity of hate content to and from the Rewrite scenario for the user.\n4. Allowed severity of hate content in general for the user.","supportedPlatforms":["Windows"],"tags":["Rewrite","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedHateContentSpecificRewriteUser;L_AllowedHateContentSpecificRewriteUserDecimal","uniqueId":2995,"displayName":"Allowed severity of hate content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of hate content to and from the Rewrite scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no hate content.\n\n7 means allow all hate content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of hate content to and from the Rewrite scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of hate content to and from the Rewrite scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of hate content to and from the Rewrite scenario for the computer.\n2. Allowed severity of hate content in general for the computer.\n3. Allowed severity of hate content to and from the Rewrite scenario for the user.\n4. Allowed severity of hate content in general for the user.","supportedPlatforms":["Windows"],"tags":["Rewrite","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\rewrite","registrySubPath":"allowedhatecontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedHateContentSpecificSummarizationUser","uniqueId":3023,"displayName":"Allowed severity of hate content to and from the Summarization scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedHateContentSpecificSummarizationUser;L_AllowedHateContentSpecificSummarizationUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of hate content to and from the Summarization scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no hate content.\n\n7 means allow all hate content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of hate content to and from the Summarization scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of hate content to and from the Summarization scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of hate content to and from the Summarization scenario for the computer.\n2. Allowed severity of hate content in general for the computer.\n3. Allowed severity of hate content to and from the Summarization scenario for the user.\n4. Allowed severity of hate content in general for the user.","supportedPlatforms":["Windows"],"tags":["Summarization","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedHateContentSpecificSummarizationUser;L_AllowedHateContentSpecificSummarizationUserDecimal","uniqueId":3022,"displayName":"Allowed severity of hate content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of hate content to and from the Summarization scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no hate content.\n\n7 means allow all hate content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of hate content to and from the Summarization scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of hate content to and from the Summarization scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of hate content to and from the Summarization scenario for the computer.\n2. Allowed severity of hate content in general for the computer.\n3. Allowed severity of hate content to and from the Summarization scenario for the user.\n4. Allowed severity of hate content in general for the user.","supportedPlatforms":["Windows"],"tags":["Summarization","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\summarization","registrySubPath":"allowedhatecontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedHateContentSpecificSummarizationWithReferencesUser","uniqueId":3032,"displayName":"Allowed severity of hate content to and from the Summarization with References scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedHateContentSpecificSummarizationWithReferencesUser;L_AllowedHateContentSpecificSummarizationWithReferencesUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of hate content to and from the Summarization with References scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no hate content.\n\n7 means allow all hate content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of hate content to and from the Summarization with References scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of hate content to and from the Summarization with References scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of hate content to and from the Summarization with References scenario for the computer.\n2. Allowed severity of hate content in general for the computer.\n3. Allowed severity of hate content to and from the Summarization with References scenario for the user.\n4. Allowed severity of hate content in general for the user.","supportedPlatforms":["Windows"],"tags":["Summarization with References","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedHateContentSpecificSummarizationWithReferencesUser;L_AllowedHateContentSpecificSummarizationWithReferencesUserDecimal","uniqueId":3031,"displayName":"Allowed severity of hate content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of hate content to and from the Summarization with References scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no hate content.\n\n7 means allow all hate content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of hate content to and from the Summarization with References scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of hate content to and from the Summarization with References scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of hate content to and from the Summarization with References scenario for the computer.\n2. Allowed severity of hate content in general for the computer.\n3. Allowed severity of hate content to and from the Summarization with References scenario for the user.\n4. Allowed severity of hate content in general for the user.","supportedPlatforms":["Windows"],"tags":["Summarization with References","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\summarizationwithreferences","registrySubPath":"allowedhatecontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedHateContentSpecificTextToTableUser","uniqueId":3050,"displayName":"Allowed severity of hate content to and from the Text to Table scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedHateContentSpecificTextToTableUser;L_AllowedHateContentSpecificTextToTableUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of hate content to and from the Text to Table scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no hate content.\n\n7 means allow all hate content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of hate content to and from the Text to Table scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of hate content to and from the Text to Table scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of hate content to and from the Text to Table scenario for the computer.\n2. Allowed severity of hate content in general for the computer.\n3. Allowed severity of hate content to and from the Text to Table scenario for the user.\n4. Allowed severity of hate content in general for the user.","supportedPlatforms":["Windows"],"tags":["Text to Table","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedHateContentSpecificTextToTableUser;L_AllowedHateContentSpecificTextToTableUserDecimal","uniqueId":3049,"displayName":"Allowed severity of hate content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of hate content to and from the Text to Table scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no hate content.\n\n7 means allow all hate content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of hate content to and from the Text to Table scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of hate content to and from the Text to Table scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of hate content to and from the Text to Table scenario for the computer.\n2. Allowed severity of hate content in general for the computer.\n3. Allowed severity of hate content to and from the Text to Table scenario for the user.\n4. Allowed severity of hate content in general for the user.","supportedPlatforms":["Windows"],"tags":["Text to Table","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\texttotable","registrySubPath":"allowedhatecontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedSelfHarmContentGeneralUser","uniqueId":2993,"displayName":"Allowed severity of self-harm content in general for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedSelfHarmContentGeneralUser;L_AllowedSelfHarmContentGeneralUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of self-harm content in general for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no self-harm content.\n\n7 means allow all self-harm content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of self-harm content in general defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of self-harm content to and from [a specific scenario] for the computer.\n2. Allowed severity of self-harm content in general for the computer.\n3. Allowed severity of self-harm content to and from [a specific scenario] for the user.\n4. Allowed severity of self-harm content in general for the user.","supportedPlatforms":["Windows"],"tags":["General","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedSelfHarmContentGeneralUser;L_AllowedSelfHarmContentGeneralUserDecimal","uniqueId":2992,"displayName":"Allowed severity of self-harm content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of self-harm content in general for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no self-harm content.\n\n7 means allow all self-harm content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of self-harm content in general defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of self-harm content to and from [a specific scenario] for the computer.\n2. Allowed severity of self-harm content in general for the computer.\n3. Allowed severity of self-harm content to and from [a specific scenario] for the user.\n4. Allowed severity of self-harm content in general for the user.","supportedPlatforms":["Windows"],"tags":["General","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\general","registrySubPath":"allowedselfharmcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedSelfHarmContentSpecificAlternativeTextUser","uniqueId":3020,"displayName":"Allowed severity of self-harm content to and from the Alternative Text scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedSelfHarmContentSpecificAlternativeTextUser;L_AllowedSelfHarmContentSpecificAlternativeTextUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of self-harm content to and from the Alternative Text scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no self-harm content.\n\n7 means allow all self-harm content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of self-harm content to and from the Alternative Text scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of self-harm content to and from the Alternative Text scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of self-harm content to and from the Alternative Text scenario for the computer.\n2. Allowed severity of self-harm content in general for the computer.\n3. Allowed severity of self-harm content to and from the Alternative Text scenario for the user.\n4. Allowed severity of self-harm content in general for the user.","supportedPlatforms":["Windows"],"tags":["Alternative Text","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedSelfHarmContentSpecificAlternativeTextUser;L_AllowedSelfHarmContentSpecificAlternativeTextUserDecimal","uniqueId":3019,"displayName":"Allowed severity of self-harm content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of self-harm content to and from the Alternative Text scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no self-harm content.\n\n7 means allow all self-harm content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of self-harm content to and from the Alternative Text scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of self-harm content to and from the Alternative Text scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of self-harm content to and from the Alternative Text scenario for the computer.\n2. Allowed severity of self-harm content in general for the computer.\n3. Allowed severity of self-harm content to and from the Alternative Text scenario for the user.\n4. Allowed severity of self-harm content in general for the user.","supportedPlatforms":["Windows"],"tags":["Alternative Text","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\alternativetext","registrySubPath":"allowedselfharmcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedSelfHarmContentSpecificImageQuestionAndAnsweringUser","uniqueId":3047,"displayName":"Allowed severity of self-harm content to and from the Image Question and Answering scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedSelfHarmContentSpecificImageQuestionAndAnsweringUser;L_AllowedSelfHarmContentSpecificImageQuestionAndAnsweringUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of self-harm content to and from the Image Question and Answering scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no self-harm content.\n\n7 means allow all self-harm content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of self-harm content to and from the Image Question and Answering scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of self-harm content to and from the Image Question and Answering scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of self-harm content to and from the Image Question and Answering scenario for the computer.\n2. Allowed severity of self-harm content in general for the computer.\n3. Allowed severity of self-harm content to and from the Image Question and Answering scenario for the user.\n4. Allowed severity of self-harm content in general for the user.","supportedPlatforms":["Windows"],"tags":["Image Question and Answering","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedSelfHarmContentSpecificImageQuestionAndAnsweringUser;L_AllowedSelfHarmContentSpecificImageQuestionAndAnsweringUserDecimal","uniqueId":3046,"displayName":"Allowed severity of self-harm content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of self-harm content to and from the Image Question and Answering scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no self-harm content.\n\n7 means allow all self-harm content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of self-harm content to and from the Image Question and Answering scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of self-harm content to and from the Image Question and Answering scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of self-harm content to and from the Image Question and Answering scenario for the computer.\n2. Allowed severity of self-harm content in general for the computer.\n3. Allowed severity of self-harm content to and from the Image Question and Answering scenario for the user.\n4. Allowed severity of self-harm content in general for the user.","supportedPlatforms":["Windows"],"tags":["Image Question and Answering","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\imagequestionandanswering","registrySubPath":"allowedselfharmcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedSelfHarmContentSpecificPromptAssistanceUser","uniqueId":3011,"displayName":"Allowed severity of self-harm content to and from the Prompt Assistance scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedSelfHarmContentSpecificPromptAssistanceUser;L_AllowedSelfHarmContentSpecificPromptAssistanceUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of self-harm content to and from the Prompt Assistance scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no self-harm content.\n\n7 means allow all self-harm content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of self-harm content to and from the Prompt Assistance scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of self-harm content to and from the Prompt Assistance scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of self-harm content to and from the Prompt Assistance scenario for the computer.\n2. Allowed severity of self-harm content in general for the computer.\n3. Allowed severity of self-harm content to and from the Prompt Assistance scenario for the user.\n4. Allowed severity of self-harm content in general for the user.","supportedPlatforms":["Windows"],"tags":["Prompt Assistance","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedSelfHarmContentSpecificPromptAssistanceUser;L_AllowedSelfHarmContentSpecificPromptAssistanceUserDecimal","uniqueId":3010,"displayName":"Allowed severity of self-harm content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of self-harm content to and from the Prompt Assistance scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no self-harm content.\n\n7 means allow all self-harm content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of self-harm content to and from the Prompt Assistance scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of self-harm content to and from the Prompt Assistance scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of self-harm content to and from the Prompt Assistance scenario for the computer.\n2. Allowed severity of self-harm content in general for the computer.\n3. Allowed severity of self-harm content to and from the Prompt Assistance scenario for the user.\n4. Allowed severity of self-harm content in general for the user.","supportedPlatforms":["Windows"],"tags":["Prompt Assistance","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\promptassistance","registrySubPath":"allowedselfharmcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedSelfHarmContentSpecificRewriteUser","uniqueId":3002,"displayName":"Allowed severity of self-harm content to and from the Rewrite scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedSelfHarmContentSpecificRewriteUser;L_AllowedSelfHarmContentSpecificRewriteUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of self-harm content to and from the Rewrite scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no self-harm content.\n\n7 means allow all self-harm content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of self-harm content to and from the Rewrite scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of self-harm content to and from the Rewrite scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of self-harm content to and from the Rewrite scenario for the computer.\n2. Allowed severity of self-harm content in general for the computer.\n3. Allowed severity of self-harm content to and from the Rewrite scenario for the user.\n4. Allowed severity of self-harm content in general for the user.","supportedPlatforms":["Windows"],"tags":["Rewrite","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedSelfHarmContentSpecificRewriteUser;L_AllowedSelfHarmContentSpecificRewriteUserDecimal","uniqueId":3001,"displayName":"Allowed severity of self-harm content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of self-harm content to and from the Rewrite scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no self-harm content.\n\n7 means allow all self-harm content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of self-harm content to and from the Rewrite scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of self-harm content to and from the Rewrite scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of self-harm content to and from the Rewrite scenario for the computer.\n2. Allowed severity of self-harm content in general for the computer.\n3. Allowed severity of self-harm content to and from the Rewrite scenario for the user.\n4. Allowed severity of self-harm content in general for the user.","supportedPlatforms":["Windows"],"tags":["Rewrite","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\rewrite","registrySubPath":"allowedselfharmcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedSelfHarmContentSpecificSummarizationUser","uniqueId":3029,"displayName":"Allowed severity of self-harm content to and from the Summarization scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedSelfHarmContentSpecificSummarizationUser;L_AllowedSelfHarmContentSpecificSummarizationUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of self-harm content to and from the Summarization scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no self-harm content.\n\n7 means allow all self-harm content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of self-harm content to and from the Summarization scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of self-harm content to and from the Summarization scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of self-harm content to and from the Summarization scenario for the computer.\n2. Allowed severity of self-harm content in general for the computer.\n3. Allowed severity of self-harm content to and from the Summarization scenario for the user.\n4. Allowed severity of self-harm content in general for the user.","supportedPlatforms":["Windows"],"tags":["Summarization","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedSelfHarmContentSpecificSummarizationUser;L_AllowedSelfHarmContentSpecificSummarizationUserDecimal","uniqueId":3028,"displayName":"Allowed severity of self-harm content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of self-harm content to and from the Summarization scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no self-harm content.\n\n7 means allow all self-harm content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of self-harm content to and from the Summarization scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of self-harm content to and from the Summarization scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of self-harm content to and from the Summarization scenario for the computer.\n2. Allowed severity of self-harm content in general for the computer.\n3. Allowed severity of self-harm content to and from the Summarization scenario for the user.\n4. Allowed severity of self-harm content in general for the user.","supportedPlatforms":["Windows"],"tags":["Summarization","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\summarization","registrySubPath":"allowedselfharmcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedSelfHarmContentSpecificSummarizationWithReferencesUser","uniqueId":3038,"displayName":"Allowed severity of self-harm content to and from the Summarization with References scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedSelfHarmContentSpecificSummarizationWithReferencesUser;L_AllowedSelfHarmContentSpecificSummarizationWithReferencesUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of self-harm content to and from the Summarization with References scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no self-harm content.\n\n7 means allow all self-harm content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of self-harm content to and from the Summarization with References scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of self-harm content to and from the Summarization with References scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of self-harm content to and from the Summarization with References scenario for the computer.\n2. Allowed severity of self-harm content in general for the computer.\n3. Allowed severity of self-harm content to and from the Summarization with References scenario for the user.\n4. Allowed severity of self-harm content in general for the user.","supportedPlatforms":["Windows"],"tags":["Summarization with References","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedSelfHarmContentSpecificSummarizationWithReferencesUser;L_AllowedSelfHarmContentSpecificSummarizationWithReferencesUserDecimal","uniqueId":3037,"displayName":"Allowed severity of self-harm content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of self-harm content to and from the Summarization with References scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no self-harm content.\n\n7 means allow all self-harm content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of self-harm content to and from the Summarization with References scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of self-harm content to and from the Summarization with References scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of self-harm content to and from the Summarization with References scenario for the computer.\n2. Allowed severity of self-harm content in general for the computer.\n3. Allowed severity of self-harm content to and from the Summarization with References scenario for the user.\n4. Allowed severity of self-harm content in general for the user.","supportedPlatforms":["Windows"],"tags":["Summarization with References","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\summarizationwithreferences","registrySubPath":"allowedselfharmcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedSelfHarmContentSpecificTextToTableUser","uniqueId":3056,"displayName":"Allowed severity of self-harm content to and from the Text to Table scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedSelfHarmContentSpecificTextToTableUser;L_AllowedSelfHarmContentSpecificTextToTableUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of self-harm content to and from the Text to Table scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no self-harm content.\n\n7 means allow all self-harm content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of self-harm content to and from the Text to Table scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of self-harm content to and from the Text to Table scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of self-harm content to and from the Text to Table scenario for the computer.\n2. Allowed severity of self-harm content in general for the computer.\n3. Allowed severity of self-harm content to and from the Text to Table scenario for the user.\n4. Allowed severity of self-harm content in general for the user.","supportedPlatforms":["Windows"],"tags":["Text to Table","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedSelfHarmContentSpecificTextToTableUser;L_AllowedSelfHarmContentSpecificTextToTableUserDecimal","uniqueId":3055,"displayName":"Allowed severity of self-harm content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of self-harm content to and from the Text to Table scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no self-harm content.\n\n7 means allow all self-harm content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of self-harm content to and from the Text to Table scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of self-harm content to and from the Text to Table scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of self-harm content to and from the Text to Table scenario for the computer.\n2. Allowed severity of self-harm content in general for the computer.\n3. Allowed severity of self-harm content to and from the Text to Table scenario for the user.\n4. Allowed severity of self-harm content in general for the user.","supportedPlatforms":["Windows"],"tags":["Text to Table","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\texttotable","registrySubPath":"allowedselfharmcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedSexualContentGeneralUser","uniqueId":2991,"displayName":"Allowed severity of sexual content in general for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedSexualContentGeneralUser;L_AllowedSexualContentGeneralUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of sexual content in general for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no sexual content.\n\n7 means allow all sexual content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of sexual content in general defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of sexual content to and from [a specific scenario] for the computer.\n2. Allowed severity of sexual content in general for the computer.\n3. Allowed severity of sexual content to and from [a specific scenario] for the user.\n4. Allowed severity of sexual content in general for the user.","supportedPlatforms":["Windows"],"tags":["General","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedSexualContentGeneralUser;L_AllowedSexualContentGeneralUserDecimal","uniqueId":2990,"displayName":"Allowed severity of sexual content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of sexual content in general for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no sexual content.\n\n7 means allow all sexual content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of sexual content in general defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of sexual content to and from [a specific scenario] for the computer.\n2. Allowed severity of sexual content in general for the computer.\n3. Allowed severity of sexual content to and from [a specific scenario] for the user.\n4. Allowed severity of sexual content in general for the user.","supportedPlatforms":["Windows"],"tags":["General","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\general","registrySubPath":"allowedsexualcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedSexualContentSpecificAlternativeTextUser","uniqueId":3018,"displayName":"Allowed severity of sexual content to and from the Alternative Text scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedSexualContentSpecificAlternativeTextUser;L_AllowedSexualContentSpecificAlternativeTextUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of sexual content to and from the Alternative Text scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no sexual content.\n\n7 means allow all sexual content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of sexual content to and from the Alternative Text scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of sexual content to and from the Alternative Text scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of sexual content to and from the Alternative Text scenario for the computer.\n2. Allowed severity of sexual content in general for the computer.\n3. Allowed severity of sexual content to and from the Alternative Text scenario for the user.\n4. Allowed severity of sexual content in general for the user.","supportedPlatforms":["Windows"],"tags":["Alternative Text","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedSexualContentSpecificAlternativeTextUser;L_AllowedSexualContentSpecificAlternativeTextUserDecimal","uniqueId":3017,"displayName":"Allowed severity of sexual content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of sexual content to and from the Alternative Text scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no sexual content.\n\n7 means allow all sexual content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of sexual content to and from the Alternative Text scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of sexual content to and from the Alternative Text scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of sexual content to and from the Alternative Text scenario for the computer.\n2. Allowed severity of sexual content in general for the computer.\n3. Allowed severity of sexual content to and from the Alternative Text scenario for the user.\n4. Allowed severity of sexual content in general for the user.","supportedPlatforms":["Windows"],"tags":["Alternative Text","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\alternativetext","registrySubPath":"allowedsexualcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedSexualContentSpecificImageQuestionAndAnsweringUser","uniqueId":3045,"displayName":"Allowed severity of sexual content to and from the Image Question and Answering scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedSexualContentSpecificImageQuestionAndAnsweringUser;L_AllowedSexualContentSpecificImageQuestionAndAnsweringUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of sexual content to and from the Image Question and Answering scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no sexual content.\n\n7 means allow all sexual content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of sexual content to and from the Image Question and Answering scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of sexual content to and from the Image Question and Answering scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of sexual content to and from the Image Question and Answering scenario for the computer.\n2. Allowed severity of sexual content in general for the computer.\n3. Allowed severity of sexual content to and from the Image Question and Answering scenario for the user.\n4. Allowed severity of sexual content in general for the user.","supportedPlatforms":["Windows"],"tags":["Image Question and Answering","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedSexualContentSpecificImageQuestionAndAnsweringUser;L_AllowedSexualContentSpecificImageQuestionAndAnsweringUserDecimal","uniqueId":3044,"displayName":"Allowed severity of sexual content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of sexual content to and from the Image Question and Answering scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no sexual content.\n\n7 means allow all sexual content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of sexual content to and from the Image Question and Answering scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of sexual content to and from the Image Question and Answering scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of sexual content to and from the Image Question and Answering scenario for the computer.\n2. Allowed severity of sexual content in general for the computer.\n3. Allowed severity of sexual content to and from the Image Question and Answering scenario for the user.\n4. Allowed severity of sexual content in general for the user.","supportedPlatforms":["Windows"],"tags":["Image Question and Answering","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\imagequestionandanswering","registrySubPath":"allowedsexualcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedSexualContentSpecificPromptAssistanceUser","uniqueId":3009,"displayName":"Allowed severity of sexual content to and from the Prompt Assistance scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedSexualContentSpecificPromptAssistanceUser;L_AllowedSexualContentSpecificPromptAssistanceUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of sexual content to and from the Prompt Assistance scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no sexual content.\n\n7 means allow all sexual content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of sexual content to and from the Prompt Assistance scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of sexual content to and from the Prompt Assistance scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of sexual content to and from the Prompt Assistance scenario for the computer.\n2. Allowed severity of sexual content in general for the computer.\n3. Allowed severity of sexual content to and from the Prompt Assistance scenario for the user.\n4. Allowed severity of sexual content in general for the user.","supportedPlatforms":["Windows"],"tags":["Prompt Assistance","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedSexualContentSpecificPromptAssistanceUser;L_AllowedSexualContentSpecificPromptAssistanceUserDecimal","uniqueId":3008,"displayName":"Allowed severity of sexual content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of sexual content to and from the Prompt Assistance scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no sexual content.\n\n7 means allow all sexual content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of sexual content to and from the Prompt Assistance scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of sexual content to and from the Prompt Assistance scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of sexual content to and from the Prompt Assistance scenario for the computer.\n2. Allowed severity of sexual content in general for the computer.\n3. Allowed severity of sexual content to and from the Prompt Assistance scenario for the user.\n4. Allowed severity of sexual content in general for the user.","supportedPlatforms":["Windows"],"tags":["Prompt Assistance","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\promptassistance","registrySubPath":"allowedsexualcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedSexualContentSpecificRewriteUser","uniqueId":3000,"displayName":"Allowed severity of sexual content to and from the Rewrite scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedSexualContentSpecificRewriteUser;L_AllowedSexualContentSpecificRewriteUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of sexual content to and from the Rewrite scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no sexual content.\n\n7 means allow all sexual content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of sexual content to and from the Rewrite scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of sexual content to and from the Rewrite scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of sexual content to and from the Rewrite scenario for the computer.\n2. Allowed severity of sexual content in general for the computer.\n3. Allowed severity of sexual content to and from the Rewrite scenario for the user.\n4. Allowed severity of sexual content in general for the user.","supportedPlatforms":["Windows"],"tags":["Rewrite","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedSexualContentSpecificRewriteUser;L_AllowedSexualContentSpecificRewriteUserDecimal","uniqueId":2999,"displayName":"Allowed severity of sexual content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of sexual content to and from the Rewrite scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no sexual content.\n\n7 means allow all sexual content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of sexual content to and from the Rewrite scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of sexual content to and from the Rewrite scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of sexual content to and from the Rewrite scenario for the computer.\n2. Allowed severity of sexual content in general for the computer.\n3. Allowed severity of sexual content to and from the Rewrite scenario for the user.\n4. Allowed severity of sexual content in general for the user.","supportedPlatforms":["Windows"],"tags":["Rewrite","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\rewrite","registrySubPath":"allowedsexualcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedSexualContentSpecificSummarizationUser","uniqueId":3027,"displayName":"Allowed severity of sexual content to and from the Summarization scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedSexualContentSpecificSummarizationUser;L_AllowedSexualContentSpecificSummarizationUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of sexual content to and from the Summarization scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no sexual content.\n\n7 means allow all sexual content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of sexual content to and from the Summarization scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of sexual content to and from the Summarization scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of sexual content to and from the Summarization scenario for the computer.\n2. Allowed severity of sexual content in general for the computer.\n3. Allowed severity of sexual content to and from the Summarization scenario for the user.\n4. Allowed severity of sexual content in general for the user.","supportedPlatforms":["Windows"],"tags":["Summarization","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedSexualContentSpecificSummarizationUser;L_AllowedSexualContentSpecificSummarizationUserDecimal","uniqueId":3026,"displayName":"Allowed severity of sexual content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of sexual content to and from the Summarization scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no sexual content.\n\n7 means allow all sexual content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of sexual content to and from the Summarization scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of sexual content to and from the Summarization scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of sexual content to and from the Summarization scenario for the computer.\n2. Allowed severity of sexual content in general for the computer.\n3. Allowed severity of sexual content to and from the Summarization scenario for the user.\n4. Allowed severity of sexual content in general for the user.","supportedPlatforms":["Windows"],"tags":["Summarization","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\summarization","registrySubPath":"allowedsexualcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedSexualContentSpecificSummarizationWithReferencesUser","uniqueId":3036,"displayName":"Allowed severity of sexual content to and from the Summarization with References scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedSexualContentSpecificSummarizationWithReferencesUser;L_AllowedSexualContentSpecificSummarizationWithReferencesUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of sexual content to and from the Summarization with References scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no sexual content.\n\n7 means allow all sexual content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of sexual content to and from the Summarization with References scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of sexual content to and from the Summarization with References scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of sexual content to and from the Summarization with References scenario for the computer.\n2. Allowed severity of sexual content in general for the computer.\n3. Allowed severity of sexual content to and from the Summarization with References scenario for the user.\n4. Allowed severity of sexual content in general for the user.","supportedPlatforms":["Windows"],"tags":["Summarization with References","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedSexualContentSpecificSummarizationWithReferencesUser;L_AllowedSexualContentSpecificSummarizationWithReferencesUserDecimal","uniqueId":3035,"displayName":"Allowed severity of sexual content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of sexual content to and from the Summarization with References scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no sexual content.\n\n7 means allow all sexual content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of sexual content to and from the Summarization with References scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of sexual content to and from the Summarization with References scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of sexual content to and from the Summarization with References scenario for the computer.\n2. Allowed severity of sexual content in general for the computer.\n3. Allowed severity of sexual content to and from the Summarization with References scenario for the user.\n4. Allowed severity of sexual content in general for the user.","supportedPlatforms":["Windows"],"tags":["Summarization with References","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\summarizationwithreferences","registrySubPath":"allowedsexualcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedSexualContentSpecificTextToTableUser","uniqueId":3054,"displayName":"Allowed severity of sexual content to and from the Text to Table scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedSexualContentSpecificTextToTableUser;L_AllowedSexualContentSpecificTextToTableUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of sexual content to and from the Text to Table scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no sexual content.\n\n7 means allow all sexual content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of sexual content to and from the Text to Table scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of sexual content to and from the Text to Table scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of sexual content to and from the Text to Table scenario for the computer.\n2. Allowed severity of sexual content in general for the computer.\n3. Allowed severity of sexual content to and from the Text to Table scenario for the user.\n4. Allowed severity of sexual content in general for the user.","supportedPlatforms":["Windows"],"tags":["Text to Table","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedSexualContentSpecificTextToTableUser;L_AllowedSexualContentSpecificTextToTableUserDecimal","uniqueId":3053,"displayName":"Allowed severity of sexual content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of sexual content to and from the Text to Table scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no sexual content.\n\n7 means allow all sexual content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of sexual content to and from the Text to Table scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of sexual content to and from the Text to Table scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of sexual content to and from the Text to Table scenario for the computer.\n2. Allowed severity of sexual content in general for the computer.\n3. Allowed severity of sexual content to and from the Text to Table scenario for the user.\n4. Allowed severity of sexual content in general for the user.","supportedPlatforms":["Windows"],"tags":["Text to Table","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\texttotable","registrySubPath":"allowedsexualcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedViolentContentGeneralUser","uniqueId":2989,"displayName":"Allowed severity of violent content in general for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedViolentContentGeneralUser;L_AllowedViolentContentGeneralUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of violent content in general for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no violent content.\n\n7 means allow all violent content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of violent content in general defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of violent content to and from [a specific scenario] for the computer.\n2. Allowed severity of violent content in general for the computer.\n3. Allowed severity of violent content to and from [a specific scenario] for the user.\n4. Allowed severity of violent content in general for the user.","supportedPlatforms":["Windows"],"tags":["General","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedViolentContentGeneralUser;L_AllowedViolentContentGeneralUserDecimal","uniqueId":2988,"displayName":"Allowed severity of violent content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of violent content in general for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no violent content.\n\n7 means allow all violent content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of violent content in general defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of violent content to and from [a specific scenario] for the computer.\n2. Allowed severity of violent content in general for the computer.\n3. Allowed severity of violent content to and from [a specific scenario] for the user.\n4. Allowed severity of violent content in general for the user.","supportedPlatforms":["Windows"],"tags":["General","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\general","registrySubPath":"allowedviolentcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedViolentContentSpecificAlternativeTextUser","uniqueId":3016,"displayName":"Allowed severity of violent content to and from the Alternative Text scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedViolentContentSpecificAlternativeTextUser;L_AllowedViolentContentSpecificAlternativeTextUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of violent content to and from the Alternative Text scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no violent content.\n\n7 means allow all violent content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of violent content to and from the Alternative Text scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of violent content to and from the Alternative Text scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of violent content to and from the Alternative Text scenario for the computer.\n2. Allowed severity of violent content in general for the computer.\n3. Allowed severity of violent content to and from the Alternative Text scenario for the user.\n4. Allowed severity of violent content in general for the user.","supportedPlatforms":["Windows"],"tags":["Alternative Text","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedViolentContentSpecificAlternativeTextUser;L_AllowedViolentContentSpecificAlternativeTextUserDecimal","uniqueId":3015,"displayName":"Allowed severity of violent content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of violent content to and from the Alternative Text scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no violent content.\n\n7 means allow all violent content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of violent content to and from the Alternative Text scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of violent content to and from the Alternative Text scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of violent content to and from the Alternative Text scenario for the computer.\n2. Allowed severity of violent content in general for the computer.\n3. Allowed severity of violent content to and from the Alternative Text scenario for the user.\n4. Allowed severity of violent content in general for the user.","supportedPlatforms":["Windows"],"tags":["Alternative Text","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\alternativetext","registrySubPath":"allowedviolentcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedViolentContentSpecificImageQuestionAndAnsweringUser","uniqueId":3043,"displayName":"Allowed severity of violent content to and from the Image Question and Answering scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedViolentContentSpecificImageQuestionAndAnsweringUser;L_AllowedViolentContentSpecificImageQuestionAndAnsweringUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of violent content to and from the Image Question and Answering scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no violent content.\n\n7 means allow all violent content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of violent content to and from the Image Question and Answering scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of violent content to and from the Image Question and Answering scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of violent content to and from the Image Question and Answering scenario for the computer.\n2. Allowed severity of violent content in general for the computer.\n3. Allowed severity of violent content to and from the Image Question and Answering scenario for the user.\n4. Allowed severity of violent content in general for the user.","supportedPlatforms":["Windows"],"tags":["Image Question and Answering","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedViolentContentSpecificImageQuestionAndAnsweringUser;L_AllowedViolentContentSpecificImageQuestionAndAnsweringUserDecimal","uniqueId":3042,"displayName":"Allowed severity of violent content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of violent content to and from the Image Question and Answering scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no violent content.\n\n7 means allow all violent content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of violent content to and from the Image Question and Answering scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of violent content to and from the Image Question and Answering scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of violent content to and from the Image Question and Answering scenario for the computer.\n2. Allowed severity of violent content in general for the computer.\n3. Allowed severity of violent content to and from the Image Question and Answering scenario for the user.\n4. Allowed severity of violent content in general for the user.","supportedPlatforms":["Windows"],"tags":["Image Question and Answering","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\imagequestionandanswering","registrySubPath":"allowedviolentcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedViolentContentSpecificPromptAssistanceUser","uniqueId":3007,"displayName":"Allowed severity of violent content to and from the Prompt Assistance scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedViolentContentSpecificPromptAssistanceUser;L_AllowedViolentContentSpecificPromptAssistanceUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of violent content to and from the Prompt Assistance scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no violent content.\n\n7 means allow all violent content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of violent content to and from the Prompt Assistance scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of violent content to and from the Prompt Assistance scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of violent content to and from the Prompt Assistance scenario for the computer.\n2. Allowed severity of violent content in general for the computer.\n3. Allowed severity of violent content to and from the Prompt Assistance scenario for the user.\n4. Allowed severity of violent content in general for the user.","supportedPlatforms":["Windows"],"tags":["Prompt Assistance","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedViolentContentSpecificPromptAssistanceUser;L_AllowedViolentContentSpecificPromptAssistanceUserDecimal","uniqueId":3006,"displayName":"Allowed severity of violent content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of violent content to and from the Prompt Assistance scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no violent content.\n\n7 means allow all violent content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of violent content to and from the Prompt Assistance scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of violent content to and from the Prompt Assistance scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of violent content to and from the Prompt Assistance scenario for the computer.\n2. Allowed severity of violent content in general for the computer.\n3. Allowed severity of violent content to and from the Prompt Assistance scenario for the user.\n4. Allowed severity of violent content in general for the user.","supportedPlatforms":["Windows"],"tags":["Prompt Assistance","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\promptassistance","registrySubPath":"allowedviolentcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedViolentContentSpecificRewriteUser","uniqueId":2998,"displayName":"Allowed severity of violent content to and from the Rewrite scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedViolentContentSpecificRewriteUser;L_AllowedViolentContentSpecificRewriteUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of violent content to and from the Rewrite scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no violent content.\n\n7 means allow all violent content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of violent content to and from the Rewrite scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of violent content to and from the Rewrite scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of violent content to and from the Rewrite scenario for the computer.\n2. Allowed severity of violent content in general for the computer.\n3. Allowed severity of violent content to and from the Rewrite scenario for the user.\n4. Allowed severity of violent content in general for the user.","supportedPlatforms":["Windows"],"tags":["Rewrite","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedViolentContentSpecificRewriteUser;L_AllowedViolentContentSpecificRewriteUserDecimal","uniqueId":2997,"displayName":"Allowed severity of violent content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of violent content to and from the Rewrite scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no violent content.\n\n7 means allow all violent content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of violent content to and from the Rewrite scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of violent content to and from the Rewrite scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of violent content to and from the Rewrite scenario for the computer.\n2. Allowed severity of violent content in general for the computer.\n3. Allowed severity of violent content to and from the Rewrite scenario for the user.\n4. Allowed severity of violent content in general for the user.","supportedPlatforms":["Windows"],"tags":["Rewrite","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\rewrite","registrySubPath":"allowedviolentcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedViolentContentSpecificSummarizationUser","uniqueId":3025,"displayName":"Allowed severity of violent content to and from the Summarization scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedViolentContentSpecificSummarizationUser;L_AllowedViolentContentSpecificSummarizationUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of violent content to and from the Summarization scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no violent content.\n\n7 means allow all violent content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of violent content to and from the Summarization scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of violent content to and from the Summarization scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of violent content to and from the Summarization scenario for the computer.\n2. Allowed severity of violent content in general for the computer.\n3. Allowed severity of violent content to and from the Summarization scenario for the user.\n4. Allowed severity of violent content in general for the user.","supportedPlatforms":["Windows"],"tags":["Summarization","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedViolentContentSpecificSummarizationUser;L_AllowedViolentContentSpecificSummarizationUserDecimal","uniqueId":3024,"displayName":"Allowed severity of violent content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of violent content to and from the Summarization scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no violent content.\n\n7 means allow all violent content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of violent content to and from the Summarization scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of violent content to and from the Summarization scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of violent content to and from the Summarization scenario for the computer.\n2. Allowed severity of violent content in general for the computer.\n3. Allowed severity of violent content to and from the Summarization scenario for the user.\n4. Allowed severity of violent content in general for the user.","supportedPlatforms":["Windows"],"tags":["Summarization","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\summarization","registrySubPath":"allowedviolentcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedViolentContentSpecificSummarizationWithReferencesUser","uniqueId":3034,"displayName":"Allowed severity of violent content to and from the Summarization with References scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedViolentContentSpecificSummarizationWithReferencesUser;L_AllowedViolentContentSpecificSummarizationWithReferencesUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of violent content to and from the Summarization with References scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no violent content.\n\n7 means allow all violent content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of violent content to and from the Summarization with References scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of violent content to and from the Summarization with References scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of violent content to and from the Summarization with References scenario for the computer.\n2. Allowed severity of violent content in general for the computer.\n3. Allowed severity of violent content to and from the Summarization with References scenario for the user.\n4. Allowed severity of violent content in general for the user.","supportedPlatforms":["Windows"],"tags":["Summarization with References","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedViolentContentSpecificSummarizationWithReferencesUser;L_AllowedViolentContentSpecificSummarizationWithReferencesUserDecimal","uniqueId":3033,"displayName":"Allowed severity of violent content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of violent content to and from the Summarization with References scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no violent content.\n\n7 means allow all violent content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of violent content to and from the Summarization with References scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of violent content to and from the Summarization with References scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of violent content to and from the Summarization with References scenario for the computer.\n2. Allowed severity of violent content in general for the computer.\n3. Allowed severity of violent content to and from the Summarization with References scenario for the user.\n4. Allowed severity of violent content in general for the user.","supportedPlatforms":["Windows"],"tags":["Summarization with References","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\summarizationwithreferences","registrySubPath":"allowedviolentcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowedViolentContentSpecificTextToTableUser","uniqueId":3052,"displayName":"Allowed severity of violent content to and from the Text to Table scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AllowedViolentContentSpecificTextToTableUser;L_AllowedViolentContentSpecificTextToTableUserDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis local content safety policy setting adjusts the allowed severity of violent content to and from the Text to Table scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no violent content.\n\n7 means allow all violent content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of violent content to and from the Text to Table scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of violent content to and from the Text to Table scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of violent content to and from the Text to Table scenario for the computer.\n2. Allowed severity of violent content in general for the computer.\n3. Allowed severity of violent content to and from the Text to Table scenario for the user.\n4. Allowed severity of violent content in general for the user.","supportedPlatforms":["Windows"],"tags":["Text to Table","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AllowedViolentContentSpecificTextToTableUser;L_AllowedViolentContentSpecificTextToTableUserDecimal","uniqueId":3051,"displayName":"Allowed severity of violent content","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":7},"dataType":"Integer"},"defaultValue":"2","description":"\nThis local content safety policy setting adjusts the allowed severity of violent content to and from the Text to Table scenario for the user. The allowed severity may range from 0 to 7.\n\n0 means allow no violent content.\n\n7 means allow all violent content.\n\nFor more information on content safety severities, please refer to the following documentation:\nhttps://learn.microsoft.com/en-us/azure/ai-services/content-safety/concepts/harm-categories?tabs=definitions\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is not configured, the allowed severity of violent content to and from the Text to Table scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, the allowed severity of violent content to and from the Text to Table scenario defaults to 2.\n\nFor this policy setting, the order of priority is:\n1. Allowed severity of violent content to and from the Text to Table scenario for the computer.\n2. Allowed severity of violent content in general for the computer.\n3. Allowed severity of violent content to and from the Text to Table scenario for the user.\n4. Allowed severity of violent content in general for the user.","supportedPlatforms":["Windows"],"tags":["Text to Table","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\texttotable","registrySubPath":"allowedviolentcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowFileSynchronizationViaSOAPOnlyOnDomainNetworks","uniqueId":2538,"displayName":"Allow file synchronization via SOAP over HTTP only on domain networks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls file synchronization via SOAP over HTTP.\n\nIf you enable this policy setting, file synchronization via SOAP over HTTP is allowed only on domain networks. \n\nIf you disable or do not configure this policy setting, file synchronization via SOAP over HTTP functions on all networks.","supportedPlatforms":["Windows"],"tags":["Server Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\fileio","registrySubPath":"synconlyondomainnetwork","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowFrontierEnrollment","uniqueId":5311,"displayName":"Allow users to enroll in Copilot Frontier","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy controls whether the Copilot Frontier enrollment toggle is exposed in Office for Windows, allowing end users to self-enroll in the Copilot Frontier program.  To learn more about the Frontier program, see https://go.microsoft.com/fwlink/?linkid=2336803.\n\nIf you enable this policy, users will be able to see and interact with the Copilot Frontier toggle, allowing users to self-enroll in the Copilot Frontier program.  Only users with an active Copilot entitlement will have the Copilot Frontier toggle available to them.\n\nIf you disable this policy, users will not be able to see or interact with the Copilot Frontier toggle, preventing them from enrolling in the Copilot Frontier program.  Any user that has previously enrolled in the Copilot Frontier program will be evicted from the program on all of their Office for Windows devices.\n\nIf you do not configure the policy, the default behavior of showing the Copilot Frontier toggle will be in effect.  Note that in some environments, the default behavior may be to suppress the Copilot Frontier toggle feature.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["AllowFrontierEnrollment","Cloud Policies Boolean","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"AllowFrontierEnrollment","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowLinkedInFeatures","uniqueId":2924,"displayName":"Show LinkedIn features in Office applications","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting will prevent LinkedIn features from appearing in the Office applications.\n\nIf you enable or do not configure this policy, users will be able to leverage LinkedIn data and resources from a variety of locations within the Office applications.\n\nIf you disable this policy setting, LinkedIn features will not be available.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.​","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"linkedin","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Allowmixofpolicyanduserlocations","uniqueId":1897,"displayName":"Allow mix of policy and user locations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting controls whether trusted locations can be defined by users, the Office Customization Tool (OCT), and Group Policy, or if they must be defined by Group Policy alone.\n       \nIf you enable this policy setting, users can specify any location as a trusted location, and a computer can have a combination of user-created, OCT-created, and Group Policy-created trusted locations.\n \nIf you disable this policy setting, all trusted locations that are not created by Group Policy are disabled and users cannot create new trusted locations in the Trust Center.\n \nIf you do not configure this policy setting, the behavior is the equivalent of setting the policy to Enabled.\n \nNote -  InfoPath 2016 and Outlook 2016 do not recognize trusted locations, and therefore are unaffected by this policy setting.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations","registrySubPath":"allow user locations","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowNonAdminUserInstallLAPs","uniqueId":2035,"displayName":"Allow users who aren’t admins to install language accessory packs","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can install language accessory packs for Office even if they don’t have local administrator permissions on their devices. By default, users must have local administrator permissions on their devices to install language accessory packs.\n\nIf you enable this policy setting, users will be able to install language accessory packs for Office even if they don’t have local administrator permissions on their devices. They can install those language accessory packs by going to File > Options > Language in the app, such as Word.\n\nIf you disable or don’t configure this policy setting, users who don’t have local administrator permissions on their devices won’t be able to install language accessory packs. Someone with local administrator permissions on the device will need to install the language accessory packs for the user.\n\nFor more information, see https://go.microsoft.com/fwlink/p/?linkid=2161939.\n      ","supportedPlatforms":["Windows"],"tags":["Display Language","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources","registrySubPath":"allownonadminuserinstalllanguages","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowPNGasanoutputformat","uniqueId":1665,"displayName":"Allow PNG as an output format","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether Office 2016 applications can output graphics in Portable Network Graphics (PNG) format when documents are saved as Web pages.\n\nIf you enable this policy setting, Office 2016 applications can save graphics in PNG format and users cannot change this configuration.\n\nIf you disable this policy setting, Office 2016 applications cannot save graphics in PNG format and users cannot change this configuration.\n\nIf you do not configure this policy setting, Office 2016 applications do not save graphics in the PNG format. Users can change this functionality by opening the application's Options dialog box, clicking Advanced, clicking Web Options, and selecting the Allow PNG as a graphics format check box.","supportedPlatforms":["Windows"],"tags":["Browsers","Tools | Options | General | Web Options...","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"allowpng","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowRoamingQuickAccessToolBarRibbonCustomizations","uniqueId":1593,"displayName":"Allow roaming of all user customizations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows roaming of both the Quick Access Toolbar and Ribbon customizations.  \n\nIf you enable this policy setting, users' Quick Access Toolbar and Ribbon customizations will be available to them on any computer on their network when they log on. \n\nIf you disable or do not configure this policy setting, users' Quick Access Toolbar and Ribbon customizations will only be available to them on the computer on which they made the customizations.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars","registrySubPath":"customuiroaming","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowUnsecureApps","uniqueId":1831,"displayName":"Allow Unsecure web add-ins and Catalogs","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows users to run unsecure web add-in, which are add-ins that have web page or catalog locations that are not SSL-secured (https://), and are not in users' Internet zones.\n\nIf you enable this policy setting, users can run unsecure apps. To enable specific unsecure web add-ins, you must also configure the Trusted Web add-in Catalog policy settings to trust the catalogs that contains those Add-ins.\n\nIf you disable or do not configure this policy setting, unsecure web add-ins are not allowed.","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs","registrySubPath":"requireserververification","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowUserDefinedFileShareCatalogs","uniqueId":1836,"displayName":"Allow users to control the Trusted Shared Folder Catalogs","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy setting allows users to control all the Trusted Shared Folder Catalogs when other policy settings in the Trusted Catalogs folder are set by policy. \n\nNote: This setting only applies to Version 2308 or later of Office.\n\nIf you enable this policy setting, users can set their own Trusted Shared Folder Catalogs including the Default Shared Folder location. Shared Folder Catalogs defined by policy will not be used.\n\nIf you disable this policy setting, then all Trusted Shared Folders Catalogs are policy controlled.\n\nIf you do not configure this policy setting but do configure other policy settings in the Trusted Catalogs folder, the Trusted Shared Folder Catalogs are policy controlled. If you do not configure this policy setting or any other policy setting in the Trusted Catalogs folder, users can set their own Trusted Shared Folder locations.","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs","registrySubPath":"allowuserdefinedfilesharecatalogs","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowuserswithearlierversionsofOfficetoreadwithbrowsers","uniqueId":2493,"displayName":"Allow users with earlier versions of Office to read with browsers...","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting will allow users with earlier versions of Office to read documents with browsers supporting Information Rights Management.\n\nIf you enable this policy setting, users with earlier versions of Office can read documents with browsers supporting Information Rights Management.  Note that this will make all documents with restricted permissions larger.\n\nIf you disable or do not configure this policy setting, users with earlier versions of Office cannot read documents with browsers supporting Information Rights Management.","supportedPlatforms":["Windows"],"tags":["Manage Restricted Permissions","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\drm","registrySubPath":"includehtml","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowVbaIntranetRefs","uniqueId":2962,"displayName":"Allow VBA to load typelib references by path from untrusted intranet locations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting permits VBA to load typelib references by explicit path read from the project data if that path points to an intranet location that is not explicitly in the system trusted sites list.\n\nBy default, VBA will attempt to load typelibs referenced in a project by searching for the library GUID in the registry. If it is not found in the registry, VBA will attempt to load the typelib or project reference using the path stored in the project for the reference as long as the reference does not point to an internet or intranet location that is not in the trusted sites list.\n\nIf you enable this policy setting, VBA will treat intranet paths like local machine paths, and therefore VBA will attempt to search for unregistered references in intranet locations that are not local machine or in the system's trusted sites list.\n\nIf you disable or don’t configure this policy setting, VBA maintains its default behavior and will refuse to load typelibs on intranet paths if it does not find the typelib registered in HKEY_CLASSES_ROOT.\n      ","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\vba\\security","registrySubPath":"allowvbaintranetreferences","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AllowWebArchivestobesavedinanyHTMLencoding","uniqueId":2461,"displayName":"Allow Web Archives to be saved in any HTML encoding","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Enabled: Allow the user to save Web Archives in any HTML encoding.\n\nNot enabled: Always use US-ASCII for Web Archives.\n\nThis results in smaller files, but is not supported in Windows Internet Explorer 5.0 or earlier.","supportedPlatforms":["Windows"],"tags":["Web Archives","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"donotforceusasciiformhtml","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Alsatian","uniqueId":2046,"displayName":"Alsatian","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Alsatian","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"gsw-fr","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AlwaysexpandgroupsinOfficewhenrestrictingpermissionfordocume","uniqueId":2495,"displayName":"Always expand groups in Office when restricting permission for documents","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether group names automatically expand to display all the members of the group when selected in the Permissions dialog box. \n\nIf you enable this policy setting, when users select a group name while applying Information Rights Management (IRM) permissions to Excel workbooks, InfoPath templates, Outlook e-mail messages, PowerPoint presentations, or Word documents in the Permissions dialog box, it will automatically expand to display all the members of the group. \n\nIf you disable or do not configure this policy setting, when users select a group name in the Permissions dialog box, the members of the group are not displayed.","supportedPlatforms":["Windows"],"tags":["Manage Restricted Permissions","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\drm\\autoexpanddls","registrySubPath":"autoexpanddlsenable","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Alwaysrequireuserstoconnecttoverifypermission","uniqueId":2494,"displayName":"Always require users to connect to verify permission","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users are required to connect to the Internet or a local network to have their licenses confirmed every time they attempt to open Excel workbooks, InfoPath forms or templates, Outlook e-mail messages, PowerPoint presentations, or Word documents that are protected by Information Rights Management (IRM).  This policy is useful if you want to log the usage of files with restricted permissions on the server.\n\nIf you enable this policy setting, users are required to connect to verify permissions.  This policy setting will only affect protected files created on machines where the policy is enabled.\n\nIf you disable or do not configure this policy setting, users are not required to connect to the network to verify permissions.","supportedPlatforms":["Windows"],"tags":["Manage Restricted Permissions","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\drm","registrySubPath":"requireconnection","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AlwaysShowFileShareMoreOptions","uniqueId":2922,"displayName":"Show additional sharing choices under the File tab","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy settings controls what is displayed when the user goes to File > Share in Word, Excel, or PowerPoint.\n\nBy default, choosing File > Share takes the user to the Share dialog, which provides various choices for sharing. These choices used to appear under File > Share, but no longer appear there by default. There are some additional choices that used to appear under File > Share, but don’t appear in the Share dialog.\n\nIf you enable this policy setting, the user isn’t taken to the Share dialog and the user sees all the sharing choices under File > Share. For example, several options to share by email or an option to share by instant message.\n\nIf you disable or don’t configure this policy setting, choosing File > Share takes the user to the Share dialog, which doesn’t have all the sharing choices.\n\nNote: The user can also add buttons for these additional sharing choices to the ribbon or to the quick access toolbar, regardless of how this policy setting is configured.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"alwaysshowfilesharemoreoptions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Amharic","uniqueId":2047,"displayName":"Amharic","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Amharic","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"am-et","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ArabicAlgeria","uniqueId":2048,"displayName":"Arabic (Algeria)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Arabic (Algeria)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ar-dz","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ArabicBahrain","uniqueId":2049,"displayName":"Arabic (Bahrain)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Arabic (Bahrain)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ar-bh","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ArabicEgypt","uniqueId":2050,"displayName":"Arabic (Egypt)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Arabic (Egypt)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ar-eg","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ArabicIraq","uniqueId":2051,"displayName":"Arabic (Iraq)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Arabic (Iraq)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ar-iq","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ArabicJordan","uniqueId":2052,"displayName":"Arabic (Jordan)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Arabic (Jordan)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ar-jo","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ArabicKuwait","uniqueId":2053,"displayName":"Arabic (Kuwait)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Arabic (Kuwait)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ar-kw","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ArabicLebanon","uniqueId":2054,"displayName":"Arabic (Lebanon)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Arabic (Lebanon)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ar-lb","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ArabicLibya","uniqueId":2055,"displayName":"Arabic (Libya)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Arabic (Libya)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ar-ly","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Arabicmodes","uniqueId":1694,"displayName":"Arabic modes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Arabicmodes;L_empty239","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the spelling rules to use for checking spelling of Arabic text. This option is available only if you are using a right-to-left language version of Microsoft Office or have installed Microsoft Office 2016 proofing tools or the Microsoft Office Single Language Pack 2016 for the language, and have enabled support for the language through Microsoft Office 2016 Language Preferences.","supportedPlatforms":["Windows"],"tags":["Tools | Options | Spelling","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Arabicmodes;L_empty239","uniqueId":1693,"displayName":"Arabic modes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"None","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Strict initial alef hamza","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Strict final yaa","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Both strict","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":3,"description":"Specifies the spelling rules to use for checking spelling of Arabic text. This option is available only if you are using a right-to-left language version of Microsoft Office or have installed Microsoft Office 2016 proofing tools or the Microsoft Office Single Language Pack 2016 for the language, and have enabled support for the language through Microsoft Office 2016 Language Preferences.","supportedPlatforms":["Windows"],"tags":["Tools | Options | Spelling","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpref","registrySubPath":"wspell_1112_8","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ArabicMorocco","uniqueId":2056,"displayName":"Arabic (Morocco)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Arabic (Morocco)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ar-ma","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ArabicOman","uniqueId":2057,"displayName":"Arabic (Oman)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Arabic (Oman)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ar-om","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ArabicQatar","uniqueId":2058,"displayName":"Arabic (Qatar)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Arabic (Qatar)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ar-qa","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ArabicSaudiArabia","uniqueId":2059,"displayName":"Arabic (Saudi Arabia)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Arabic (Saudi Arabia)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ar-sa","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ArabicSyria","uniqueId":2060,"displayName":"Arabic (Syria)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Arabic (Syria)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ar-sy","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ArabicTunisia","uniqueId":2061,"displayName":"Arabic (Tunisia)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Arabic (Tunisia)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ar-tn","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ArabicUAE","uniqueId":2062,"displayName":"Arabic (U.A.E.)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Arabic (U.A.E.)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ar-ae","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ArabicYemen","uniqueId":2063,"displayName":"Arabic (Yemen)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Arabic (Yemen)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ar-ye","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ArmenianArmenia","uniqueId":2064,"displayName":"Armenian (Armenia)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Armenian (Armenia)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"hy-am","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AssameseIndia","uniqueId":2065,"displayName":"Assamese (India)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Assamese (India)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"as-in","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AuthenticationFBABehavior","uniqueId":2961,"displayName":"Control how Office handles form-based sign-in prompts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AuthenticationFBABehavior;L_authenticationFBABehaviorEnum","logicalOperator":"exists","values":null},{"dependee":"office16;L_AuthenticationFBABehavior;L_AuthenticationFBAEnabledHostsID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls how Office applications handle form-based sign-in prompts.​\n\nIf you enable this policy setting, you must choose one of the following options:​\n\nBlock all prompts​\nAsk the user what to do for each new host​\nShow prompts only from allowed hosts​\n\nIf you select “Block all prompts” then no form-based sign-in prompts are shown to the user and the user is shown a message that the sign-in method isn’t allowed.​\n\nIf you select “Ask the user what do for each new host” then the user is asked for each new host whether the user wants to sign-in to the host. If the user has previously signed-in to a host, a form-based sign-in prompt is shown for that host. Also, form-based sign-in prompts are shown for any hosts specified by the “Specify hosts allowed to show form-based sign-in prompts to users” setting.\n\nIf you select “Show prompts only from allowed hosts” then form-based sign-in prompts are shown only from hosts that have been specified by the additional “Specify hosts allowed to show form-based sign-in prompts to users” setting. Form-based sign-in prompts from all other hosts are blocked and the user is shown a message that the sign-in method isn’t allowed.\n\nNote: If you don’t configure the “Specify hosts allowed to show form-based sign-in prompts to users” setting or don’t specify any hosts in that setting, then the behavior of the “Show prompts only from allowed hosts” option will be the same as if you selected the “Block all prompts” option.\n\nIf you disable or don’t configure this policy setting, all form-based sign-in prompts are blocked and the  user is shown a message that the sign-in method isn’t allowed. But users are able to change the behavior for form-based sign-in prompts by going to File > Options > Trust Center > Trust Center Settings > Form-based sign-in.\n\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.​","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AuthenticationFBABehavior;L_authenticationFBABehaviorEnum","uniqueId":2959,"displayName":"Behavior:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block all prompts","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Ask the user what to do for each new host","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Show prompts only from allowed hosts","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":1,"description":"This policy setting controls how Office applications handle form-based sign-in prompts.​\n\nIf you enable this policy setting, you must choose one of the following options:​\n\nBlock all prompts​\nAsk the user what to do for each new host​\nShow prompts only from allowed hosts​\n\nIf you select “Block all prompts” then no form-based sign-in prompts are shown to the user and the user is shown a message that the sign-in method isn’t allowed.​\n\nIf you select “Ask the user what do for each new host” then the user is asked for each new host whether the user wants to sign-in to the host. If the user has previously signed-in to a host, a form-based sign-in prompt is shown for that host. Also, form-based sign-in prompts are shown for any hosts specified by the “Specify hosts allowed to show form-based sign-in prompts to users” setting.\n\nIf you select “Show prompts only from allowed hosts” then form-based sign-in prompts are shown only from hosts that have been specified by the additional “Specify hosts allowed to show form-based sign-in prompts to users” setting. Form-based sign-in prompts from all other hosts are blocked and the user is shown a message that the sign-in method isn’t allowed.\n\nNote: If you don’t configure the “Specify hosts allowed to show form-based sign-in prompts to users” setting or don’t specify any hosts in that setting, then the behavior of the “Show prompts only from allowed hosts” option will be the same as if you selected the “Block all prompts” option.\n\nIf you disable or don’t configure this policy setting, all form-based sign-in prompts are blocked and the  user is shown a message that the sign-in method isn’t allowed. But users are able to change the behavior for form-based sign-in prompts by going to File > Options > Trust Center > Trust Center Settings > Form-based sign-in.\n\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.​","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"fbabehavior","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AuthenticationFBABehavior;L_AuthenticationFBAEnabledHostsID","uniqueId":2960,"displayName":"Specify hosts allowed to show form-based sign-in prompts to users:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting controls how Office applications handle form-based sign-in prompts.​\n\nIf you enable this policy setting, you must choose one of the following options:​\n\nBlock all prompts​\nAsk the user what to do for each new host​\nShow prompts only from allowed hosts​\n\nIf you select “Block all prompts” then no form-based sign-in prompts are shown to the user and the user is shown a message that the sign-in method isn’t allowed.​\n\nIf you select “Ask the user what do for each new host” then the user is asked for each new host whether the user wants to sign-in to the host. If the user has previously signed-in to a host, a form-based sign-in prompt is shown for that host. Also, form-based sign-in prompts are shown for any hosts specified by the “Specify hosts allowed to show form-based sign-in prompts to users” setting.\n\nIf you select “Show prompts only from allowed hosts” then form-based sign-in prompts are shown only from hosts that have been specified by the additional “Specify hosts allowed to show form-based sign-in prompts to users” setting. Form-based sign-in prompts from all other hosts are blocked and the user is shown a message that the sign-in method isn’t allowed.\n\nNote: If you don’t configure the “Specify hosts allowed to show form-based sign-in prompts to users” setting or don’t specify any hosts in that setting, then the behavior of the “Show prompts only from allowed hosts” option will be the same as if you selected the “Block all prompts” option.\n\nIf you disable or don’t configure this policy setting, all form-based sign-in prompts are blocked and the  user is shown a message that the sign-in method isn’t allowed. But users are able to change the behavior for form-based sign-in prompts by going to File > Options > Trust Center > Trust Center Settings > Form-based sign-in.\n\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.​","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"fbaenabledhosts","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_AutomaticDiscovery","uniqueId":1595,"displayName":"Automatic Discovery","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AutomaticDiscovery;L_automaticdiscovery210","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Enables/Disables the Automatic Discovery feature.","supportedPlatforms":["Windows"],"tags":["Shared Workspace","Customize","Global Options","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AutomaticDiscovery;L_automaticdiscovery210","uniqueId":1594,"displayName":"Automatic Discovery","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"On","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"On","description":"","tags":[],"dependencyGroup":null},{"value":"Off","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Off","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"On","description":"Enables/Disables the Automatic Discovery feature.","supportedPlatforms":["Windows"],"tags":["Shared Workspace","Customize","Global Options","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\sharepointtracking","registrySubPath":"automaticdiscovery","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_AutomationSecurity","uniqueId":2012,"displayName":"Automation Security","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_AutomationSecurity;L_SettheAutomationSecuritylevel","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls whether macros can run in an Office 2016 application that is opened programmatically by another application. \n\nIf you enable this policy setting, you can choose from three options for controlling macro behavior in Excel, PowerPoint, and Word when the application is opened programmatically: \n\n- Disable macros by default - All macros are disabled in the programmatically opened application. \n\n- Macros enabled (default) - Macros can run in the programmatically opened application. This option enforces the default configuration in Excel, PowerPoint, and Word. \n\n- User application macro security level - Macro functionality is determined by the setting in the \"Macro Settings\" section of the Trust Center. \n\nIf you disable or do not configure this policy setting, when a separate program is used to launch Microsoft Excel, PowerPoint, or Word programmatically, any macros can run in the programmatically opened application without being blocked.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_AutomationSecurity;L_SettheAutomationSecuritylevel","uniqueId":2011,"displayName":"Set the Automation Security level","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable macros by default","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use application macro security level","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Macros enabled (default)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":3,"description":"This policy setting controls whether macros can run in an Office 2016 application that is opened programmatically by another application. \n\nIf you enable this policy setting, you can choose from three options for controlling macro behavior in Excel, PowerPoint, and Word when the application is opened programmatically: \n\n- Disable macros by default - All macros are disabled in the programmatically opened application. \n\n- Macros enabled (default) - Macros can run in the programmatically opened application. This option enforces the default configuration in Excel, PowerPoint, and Word. \n\n- User application macro security level - Macro functionality is determined by the setting in the \"Macro Settings\" section of the Trust Center. \n\nIf you disable or do not configure this policy setting, when a separate program is used to launch Microsoft Excel, PowerPoint, or Word programmatically, any macros can run in the programmatically opened application without being blocked.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\security","registrySubPath":"automationsecurity","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AutoOrgIDGetKey","uniqueId":2891,"displayName":"Automatically activate Office with federated organization credentials","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting activates Office on users’ computers without prompting them to sign in to their Office 365 accounts.\n\nIf you enable or do not configure this policy setting, and a user is already signed in with federated organization credentials, Office automatically activates when the user first starts an Office application. If either multiple or no organization credentials are found, the user is prompted to sign in.\n\nIf you disable this policy setting, Office might prompt the user to sign in with their organization's credentials if Office is not installed directly by the user from his or her Office 365 account homepage.\n","supportedPlatforms":["Windows"],"tags":["Subscription Activation","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"autoorgidgetkey","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_autoSaveDefaultOffExcel","uniqueId":2917,"displayName":"Turn off AutoSave by default in Excel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_autoSaveDefaultOffExcel;L_AutoSaveDefaultSettingEnum","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to turn off AutoSave by default in Excel. AutoSave automatically saves all changes a user makes to files that are stored in OneDrive, OneDrive for Business, or SharePoint Online.\n\nIf you enable this policy setting, AutoSave is off by default in Excel. But, the user can enable AutoSave for Excel by going to File > Options > Save. Or, the user can enable AutoSave for a specific Excel file by using the AutoSave toggle in the title bar.\n\nIf you disable or don’t configure this policy setting, AutoSave is on by default, but the user can disable AutoSave by going to File > Options > Save or by using the AutoSave toggle.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["AutoSave","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_autoSaveDefaultOffExcel;L_AutoSaveDefaultSettingEnum","uniqueId":2916,"displayName":"Turn off AutoSave by default in Excel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use AutoSave Default Setting","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"AutoSave Is On By Default","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"AutoSave Is Off By Default","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to turn off AutoSave by default in Excel. AutoSave automatically saves all changes a user makes to files that are stored in OneDrive, OneDrive for Business, or SharePoint Online.\n\nIf you enable this policy setting, AutoSave is off by default in Excel. But, the user can enable AutoSave for Excel by going to File > Options > Save. Or, the user can enable AutoSave for a specific Excel file by using the AutoSave toggle in the title bar.\n\nIf you disable or don’t configure this policy setting, AutoSave is on by default, but the user can disable AutoSave by going to File > Options > Save or by using the AutoSave toggle.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["AutoSave","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel","registrySubPath":"autosavebydefaultadminchoice","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_autoSaveDefaultOffPowerPoint","uniqueId":2919,"displayName":"Turn off AutoSave by default in PowerPoint","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_autoSaveDefaultOffPowerPoint;L_AutoSaveDefaultSettingEnum","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to turn off AutoSave by default in PowerPoint. AutoSave automatically saves all changes a user makes to files that are stored in OneDrive, OneDrive for Business, or SharePoint Online.\n\nIf you enable this policy setting, AutoSave is off by default in PowerPoint. But, the user can enable AutoSave for PowerPoint by going to File > Options > Save. Or, the user can enable AutoSave for a specific PowerPoint file by using the AutoSave toggle in the title bar.\n \nIf you disable or don’t configure this policy setting, AutoSave is on by default, but the user can disable AutoSave by going to File > Options > Save or by using the AutoSave toggle.\n \nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["AutoSave","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_autoSaveDefaultOffPowerPoint;L_AutoSaveDefaultSettingEnum","uniqueId":2918,"displayName":"Turn off AutoSave by default in PowerPoint","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use AutoSave Default Setting","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"AutoSave Is On By Default","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"AutoSave Is Off By Default","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to turn off AutoSave by default in PowerPoint. AutoSave automatically saves all changes a user makes to files that are stored in OneDrive, OneDrive for Business, or SharePoint Online.\n\nIf you enable this policy setting, AutoSave is off by default in PowerPoint. But, the user can enable AutoSave for PowerPoint by going to File > Options > Save. Or, the user can enable AutoSave for a specific PowerPoint file by using the AutoSave toggle in the title bar.\n \nIf you disable or don’t configure this policy setting, AutoSave is on by default, but the user can disable AutoSave by going to File > Options > Save or by using the AutoSave toggle.\n \nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["AutoSave","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint","registrySubPath":"autosavebydefaultadminchoice","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_autoSaveDefaultOffWord","uniqueId":2921,"displayName":"Turn off AutoSave by default in Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_autoSaveDefaultOffWord;L_AutoSaveDefaultSettingEnum","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to turn off AutoSave by default in Word. AutoSave automatically saves all changes a user makes to files that are stored in OneDrive, OneDrive for Business, or SharePoint Online.\n\nIf you enable this policy setting, AutoSave is off by default in Word. But, the user can enable AutoSave for Word by going to File > Options > Save. Or, the user can enable AutoSave for a specific Word file by using the AutoSave toggle in the title bar.\n \nIf you disable or don’t configure this policy setting, AutoSave is on by default, but the user can disable AutoSave by going to File > Options > Save or by using the AutoSave toggle.\n \nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["AutoSave","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_autoSaveDefaultOffWord;L_AutoSaveDefaultSettingEnum","uniqueId":2920,"displayName":"Turn off AutoSave by default in Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use AutoSave Default Setting","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"AutoSave Is On By Default","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"AutoSave Is Off By Default","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to turn off AutoSave by default in Word. AutoSave automatically saves all changes a user makes to files that are stored in OneDrive, OneDrive for Business, or SharePoint Online.\n\nIf you enable this policy setting, AutoSave is off by default in Word. But, the user can enable AutoSave for Word by going to File > Options > Save. Or, the user can enable AutoSave for a specific Word file by using the AutoSave toggle in the title bar.\n \nIf you disable or don’t configure this policy setting, AutoSave is on by default, but the user can disable AutoSave by going to File > Options > Save or by using the AutoSave toggle.\n \nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["AutoSave","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word","registrySubPath":"autosavebydefaultadminchoice","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AzerbaijaniCyrillic","uniqueId":2066,"displayName":"Azerbaijani (Cyrillic)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Azerbaijani (Cyrillic)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"az-cyrl-az","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_AzerbaijaniLatin","uniqueId":2067,"displayName":"Azerbaijani (Latin)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Azerbaijani (Latin)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"az-latn-az","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_BanglaBangladesh","uniqueId":2068,"displayName":"Bangla (Bangladesh)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Bangla (Bangladesh)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"bn-bd","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_BanglaIndia","uniqueId":2069,"displayName":"Bangla (India)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Bangla (India)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"bn-in","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_BaseURL","uniqueId":2298,"displayName":"Base URL","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_BaseURL;L_baseurl349","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the URL for the location of customized error messages.","supportedPlatforms":["Windows"],"tags":["Customizable Error Messages","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_BaseURL;L_baseurl349","uniqueId":2297,"displayName":"Base URL","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Sets the URL for the location of customized error messages.","supportedPlatforms":["Windows"],"tags":["Customizable Error Messages","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"customizablealertbaseurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_Bashkir","uniqueId":2070,"displayName":"Bashkir","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Bashkir","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ba-ru","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_BasicAuthPromptBehavior;L_AuthenticationBasicAuthEnabledHostsID","uniqueId":2977,"displayName":"Host names:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify which hosts can show Basic Authentication sign-in prompts to Office apps.\n\nBy default, all Basic Authentication sign-in prompts are blocked, and the user is shown a message that the sign-in method isn’t allowed.\n\nIf you enable this policy setting, you need to enter the hosts by name, separating the host names with a semi-colon. For example: server1.contoso.com; server2.fabrikam.com.\n\nWarning: Allowing Basic Authentication sign-in prompts isn’t recommended because it’s a security risk.\n\nBasic Authentication sign-in prompts from all other hosts will be blocked and the user will be shown a message that the sign-in method isn’t allowed.\n\nIf you disable or don’t configure this policy setting, all Basic Authentication sign-in prompts will be blocked, and the user will be shown a message that the sign-in method isn’t allowed.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.\n\nFor more information, see https://go.microsoft.com/fwlink/p/?linkid=2199001.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\identity","registrySubPath":"basichostallowlist","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_BasicAuthPromptBehavior","uniqueId":2978,"displayName":"Allow specified hosts to show Basic Authentication prompts to Office apps","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_BasicAuthPromptBehavior;L_AuthenticationBasicAuthEnabledHostsID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify which hosts can show Basic Authentication sign-in prompts to Office apps.\n\nBy default, all Basic Authentication sign-in prompts are blocked, and the user is shown a message that the sign-in method isn’t allowed.\n\nIf you enable this policy setting, you need to enter the hosts by name, separating the host names with a semi-colon. For example: server1.contoso.com; server2.fabrikam.com.\n\nWarning: Allowing Basic Authentication sign-in prompts isn’t recommended because it’s a security risk.\n\nBasic Authentication sign-in prompts from all other hosts will be blocked and the user will be shown a message that the sign-in method isn’t allowed.\n\nIf you disable or don’t configure this policy setting, all Basic Authentication sign-in prompts will be blocked, and the user will be shown a message that the sign-in method isn’t allowed.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.\n\nFor more information, see https://go.microsoft.com/fwlink/p/?linkid=2199001.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_BasicAuthProxyBehavior","uniqueId":2979,"displayName":"Allow Basic Authentication prompts from network proxies","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether network proxies are allowed to show Basic Authentication prompts.\n\nBy default, all Basic Authentication sign-in prompts are blocked, and the user is shown a message that the sign-in method isn’t allowed.\n\nIf you enable this policy setting, then network proxies will be allowed to show Basic Authentication prompts.\n\nWarning: Allowing Basic Authentication sign-in prompts isn’t recommended because it’s a security risk.\n\nIf you disable or don’t configure this policy setting, all Basic Authentication sign-in prompts from network proxes will be blocked, and the user will be shown a message that the sign-in method isn’t allowed.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.\n\nFor more information, see https://go.microsoft.com/fwlink/p/?linkid=2199001.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\identity","registrySubPath":"basicauthproxybehavior","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Basque","uniqueId":2071,"displayName":"Basque","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Basque","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"eu-es","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Belarusian","uniqueId":2072,"displayName":"Belarusian","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Belarusian","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"be-by","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_BlockedExtensions","uniqueId":2912,"displayName":"Block additional file extensions for OLE embedding","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_BlockedExtensions;L_blockedextensionsole","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.​\n\nThis policy setting allows you to specify additional file extensions that Office will block when they are embedded as an OLE package in an Office file by using the Object Packager control.\n\nBy default, Office blocks certain file extensions. For a list of those file extensions, go to https://go.microsoft.com/fwlink/?linkid=847759.\n\nImportant: Malicious scripts and executables can be embedded as an OLE package and can cause harm if clicked by the user.\n\nIf you enable this policy setting, enter the additional file extensions to block, separated by semicolons. For example, py;rb.\n\nIf you disable or don’t configure this policy setting, the default set of file extensions will be blocked.\n\nIf you want to allow certain file extensions, enable the \"Allow file extensions for OLE embedding\" policy setting. Extensions added to this policy setting will take precedence over extensions in \"Allow file extensions for OLE embedding\"","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_BlockedExtensions;L_blockedextensionsole","uniqueId":2911,"displayName":"File extensions:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.​\n\nThis policy setting allows you to specify additional file extensions that Office will block when they are embedded as an OLE package in an Office file by using the Object Packager control.\n\nBy default, Office blocks certain file extensions. For a list of those file extensions, go to https://go.microsoft.com/fwlink/?linkid=847759.\n\nImportant: Malicious scripts and executables can be embedded as an OLE package and can cause harm if clicked by the user.\n\nIf you enable this policy setting, enter the additional file extensions to block, separated by semicolons. For example, py;rb.\n\nIf you disable or don’t configure this policy setting, the default set of file extensions will be blocked.\n\nIf you want to allow certain file extensions, enable the \"Allow file extensions for OLE embedding\" policy setting. Extensions added to this policy setting will take precedence over extensions in \"Allow file extensions for OLE embedding\"","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\security","registrySubPath":"blockedextensions","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_BlockInsecureProtocols","uniqueId":2982,"displayName":"Block Insecure Protocols","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\n\t\t\tThis policy setting allows you to control which protocols can be used when opening documents in Microsoft 365 apps.\n\n\t\t\tIf you enable this policy setting, non-HTTPS links will be blocked when opening documents in Microsoft 365 apps.\n\n\t\t\tIf you disable this policy setting, all protocols and links will be allowed when opening documents in Microsoft 365 apps.\n\n\t\t\tIf you don't configure this policy setting, all protocols and links will be allowed when opening documents in Microsoft 365 apps.\n\t\t","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\fileio","registrySubPath":"blockinsecureprotocols","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_BlockMOTWMacroInTrustedOrSigned","uniqueId":2931,"displayName":"Block all internet macros (ignore trusted locations or publishers)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting removes the trusted location and trusted publisher exceptions for files downloaded from the internet with Mark of the Web (MOTW).\n\nBy default, Office blocks macros from the internet but allows exceptions for files that are either in trusted locations or signed by trusted publishers.\n\nIf you enable this policy setting, all macros in files downloaded from the internet will be blocked, including those in trusted locations or signed by trusted publishers. This provides maximum protection against internet-based macro threats.\n\nIf you disable or don't configure this policy setting, the default behavior applies where macros from the internet are blocked except when the file is in a trusted location or signed by a trusted publisher.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security","registrySubPath":"blockmotwmacrointrustedorsigned","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_BlockOLEGraph","uniqueId":1708,"displayName":"Block OLE Graph","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether Object Linking and Embedding (OLE) Graph functionality runs in Microsoft 365 apps.\n\nIf you enable this policy setting, OLE Graph, including MSGraph.Application and MSGraph.Chart, will not run in any Microsoft 365 app. Instead, a static image will render in its place.\n\nIf you disable this policy setting, OLE Graph will run in Microsoft 365 apps.\n\nIf you don't configure this policy setting, OLE Graph will run in Microsoft 365 apps.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security","registrySubPath":"blockolegraph","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_BlockopeningofprereleaseExcel","uniqueId":2601,"displayName":"Block opening of pre-release versions of file formats new to Excel 2016 through the Compatibility Pack for Office 2016 and Excel 2016 Converter","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users with the Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2016 File Formats installed can open Office Open XML files saved with pre-release versions of Excel 2016. Excel Open XML files usually have the following extensions: .xlsx, .xlsm, .xltx, .xltm, .xlam. \n\nIf you enable this policy setting, users of the Compatibility Pack will not be able to open Office Open XML files created in pre-release versions of Excel 2016.\n\nIf you disable this policy setting, users with the Compatibility Pack installed can open files saved by some pre-release versions of Excel, but not by others, which can lead to inconsistent file opening functionality.\n\nIf you do not configure this policy setting, the behavior is the equivalent of setting the policy to Enabled. ","supportedPlatforms":["Windows"],"tags":["Office 2016 Converters","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\security\\fileblock","registrySubPath":"excel12betafilesfromconverters","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_BlockopeningofprereleasePPT","uniqueId":2602,"displayName":"Block opening of pre-release versions of file formats new to PowerPoint 2016 through the Compatibility Pack for Office 2016 and PowerPoint 2016 Converter","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users with the Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2016 File Formats installed can open Office Open XML files saved with pre-release versions of PowerPoint 2016. PowerPoint Open XML files usually have the following extensions: .pptx, .pptm, .potx, .potm, .ppsx, .ppsm, .ppam, .thmx, .xml. \n\nIf you enable this policy setting, users of the Compatibility Pack will not be able to open Office Open XML files created in pre-release versions of PowerPoint 2016. \n\nIf you disable this policy setting, users with the Compatibility Pack installed can open files saved by some pre-release versions of PowerPoint, but not by others, which can lead to inconsistent file opening functionality.\n\nIf you do not configure this policy setting, the behavior is the equivalent of setting the policy to Enabled","supportedPlatforms":["Windows"],"tags":["Office 2016 Converters","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\fileblock","registrySubPath":"powerpoint12betafilesfromconverters","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_BlockOrgChart","uniqueId":1707,"displayName":"Block OrgChart","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether Organization Chart (OrgChart) Add-in for Microsoft Office programs runs in Microsoft 365 apps.\n\nIf you enable this policy setting, OrgChart will not run in any Microsoft 365 app. Instead, a static image will render in its place.\n\nIf you disable this policy setting, OrgChart will run in Microsoft 365 apps.\n\nIf you don't configure this policy setting, OrgChart will run in Microsoft 365 apps.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security","registrySubPath":"blockorgchart","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_BlockVBAMacroTrustedDocument","uniqueId":2933,"displayName":"Turn off Trusted Documents for VBA macros","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off the Trusted Documents feature for documents containing VBA macros.\n\nIf you enable this policy setting, users will always see security notifications for VBA macros in documents. When users click \"Enable Content\" for VBA macros, Office will not create a trust record for the document, ensuring that the user is prompted every time they open the document.\n\nIf you disable or don't configure this policy setting, the Trusted Documents feature allows users to always allow VBA macros in a document so that the user is not prompted the next time they open that document. Trusted documents are exempt from security notifications.\n\nNote: Enabling this policy setting does not clear existing trusted documents that were previously trusted.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security","registrySubPath":"blockvbamacrotrusteddocument","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_BlockWecFallback","uniqueId":2981,"displayName":"Restrict Apps from FPRPC Fallback","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\n\t\t\tThis policy setting allows you to control the fallback behavior of Microsoft 365 apps when using FrontPage Server Extensions Remote Procedure Call Protocol (FPRPC).\n\n\t\t\tIf you enable this policy setting, Microsoft 365 apps will not use FPRPC.\n\n\t\t\tIf you disable this policy setting, Microsoft 365 apps will continue to use FPRPC.\n\n\t\t\tIf you don't configure this policy setting, Microsoft 365 apps will continue to use FPRPC.\n\t\t","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\fileio","registrySubPath":"blockwecfallback","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_BosnianCyrillicBosniaandHerzegovina","uniqueId":2073,"displayName":"Bosnian (Cyrillic, Bosnia and Herzegovina)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Bosnian (Cyrillic, Bosnia and Herzegovina)\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"bs-cyrl-ba","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_BosnianLatinBosniaandHerzegovina","uniqueId":2074,"displayName":"Bosnian (Latin, Bosnia and Herzegovina)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Bosnian (Latin, Bosnia and Herzegovina)\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"bs-latn-ba","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_BrandManagers","uniqueId":5312,"displayName":"Elevated role for enterprise brand managers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_BrandManagers;L_BrandManagersGroup","logicalOperator":"exists","values":[]}],"logicalOperator":1}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy controls whether your organization will use the elevated security group for Brand Managers. Members of the Brand Manager security group will have elevated permissions to create, update, and delete Official Brand Kits for your organization.\n\nIf you enable this policy setting, your administrator can add users to the Brand Manager security group.\n\nIf you disable this policy setting, your administrator will not be able to add users to the Brand Manager security group.\n\nIf you do not set this policy setting, your administrator will not be able to add users to the Brand Manager security group.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["BrandManagers","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_BrandManagers;L_BrandManagersGroup","uniqueId":5313,"displayName":"Security group email address:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy controls whether your organization will use the elevated security group for Brand Managers. Members of the Brand Manager security group will have elevated permissions to create, update, and delete Official Brand Kits for your organization.\n\nIf you enable this policy setting, your administrator can add users to the Brand Manager security group.\n\nIf you disable this policy setting, your administrator will not be able to add users to the Brand Manager security group.\n\nIf you do not set this policy setting, your administrator will not be able to add users to the Brand Manager security group.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["Cloud Policies Text","Cloud Policies Composite","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\brandmanagers","registrySubPath":"brandmanagersgroup","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_Breton","uniqueId":2075,"displayName":"Breton","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Breton","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"br-fr","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Bulgarian","uniqueId":2076,"displayName":"Bulgarian","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Bulgarian","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"bg-bg","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Burmese","uniqueId":2077,"displayName":"Burmese","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Burmese","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"my-mm","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Capitalizefirstletterofsentence","uniqueId":1651,"displayName":"Capitalize first letter of sentence","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Tools | AutoCorrect Options... (Excel, PowerPoint and Access)","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\autocorrect","registrySubPath":"capitalizesentence","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Capitalizenamesofdays","uniqueId":1652,"displayName":"Capitalize names of days","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Tools | AutoCorrect Options... (Excel, PowerPoint and Access)","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\autocorrect","registrySubPath":"capitalizenamesofdays","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Catalan","uniqueId":2078,"displayName":"Catalan","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Catalan","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ca-es","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CatalogRefreshPeriod","uniqueId":2548,"displayName":"Catalog Refresh Period","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_CatalogRefreshPeriod;L_empty601","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting sets the apps for Office catalog refresh period, which is the amount of time (hours) Office waits between refreshes of the app catalogs. Refreshing the catalogs detects whether entitlements to any apps have expired.\n\nIf you enable this policy setting, set the number of hours to determine the length of the refresh period. Choose a value between 0 (always refresh) and 10,000.\n\nIf you disable or do not configure this policy setting, the catalog refresh period is set to the default 72 hours.","supportedPlatforms":["Windows"],"tags":["Server Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_CatalogRefreshPeriod;L_empty601","uniqueId":2547,"displayName":"Catalog Refresh Period","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":10000},"dataType":"Integer"},"defaultValue":"72","description":"This policy setting sets the apps for Office catalog refresh period, which is the amount of time (hours) Office waits between refreshes of the app catalogs. Refreshing the catalogs detects whether entitlements to any apps have expired.\n\nIf you enable this policy setting, set the number of hours to determine the length of the refresh period. Choose a value between 0 (always refresh) and 10,000.\n\nIf you disable or do not configure this policy setting, the catalog refresh period is set to the default 72 hours.","supportedPlatforms":["Windows"],"tags":["Server Settings","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef","registrySubPath":"catalogrefreshperiod","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CentralKurdishIraq","uniqueId":2079,"displayName":"Central Kurdish (Iraq)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Central Kurdish (Iraq)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ku-arab-iq","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ChangeDestinationURLForSharePointHyperlink","uniqueId":1537,"displayName":"Change destination URL for SharePoint hyperlink","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ChangeDestinationURLForSharePointHyperlink;L_ChangeDestinationURLForSharePointHyperlinkID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting changes the destination URL of the Learn more about SharePoint hyperlink located on the Save to SharePoint form in the Backstage view for Word, PowerPoint, Excel, Visio, and Project.\n\nIf you enable this policy setting, the hyperlink destination you provide will be used.\n\nIf you disable or do not configure this policy setting, then the default destination URL to Learn more about SharePoint will be used.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ChangeDestinationURLForSharePointHyperlink;L_ChangeDestinationURLForSharePointHyperlinkID","uniqueId":1536,"displayName":"Destination URL","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting changes the destination URL of the Learn more about SharePoint hyperlink located on the Save to SharePoint form in the Backstage view for Word, PowerPoint, Excel, Visio, and Project.\n\nIf you enable this policy setting, the hyperlink destination you provide will be used.\n\nIf you disable or do not configure this policy setting, then the default destination URL to Learn more about SharePoint will be used.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\sharepointintegration","registrySubPath":"learnmoreurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ChangeLabelOfSaveToSharePoint","uniqueId":1535,"displayName":"SharePoint Product Name","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ChangeLabelOfSaveToSharePoint;L_ChangeLabelOfSaveToSharePointID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to customize the label that is used for your company's SharePoint deployment.  This will update the label that is used in the Open and Save As places in all Office applications.\n\nYou can use this option to make it more clear to users where they should be saving company documents.\n\nIf you enable this policy setting, the new string you provide will be used to refer to your company's SharePoint deployment.  We recommend setting this to the name of your company.\n\nIf you disable or do not configure this policy setting then the default string, \"SharePoint,\" will be displayed in the Open and Save As UI in all Office applications.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ChangeLabelOfSaveToSharePoint;L_ChangeLabelOfSaveToSharePointID","uniqueId":1534,"displayName":"Custom string to be displayed:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to customize the label that is used for your company's SharePoint deployment.  This will update the label that is used in the Open and Save As places in all Office applications.\n\nYou can use this option to make it more clear to users where they should be saving company documents.\n\nIf you enable this policy setting, the new string you provide will be used to refer to your company's SharePoint deployment.  We recommend setting this to the name of your company.\n\nIf you disable or do not configure this policy setting then the default string, \"SharePoint,\" will be displayed in the Open and Save As UI in all Office applications.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\sharepointintegration","registrySubPath":"productname","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ChangeOrDeleteLinkToLanguagePackDownloadSite","uniqueId":2037,"displayName":"Change or delete link to language pack download site","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ChangeOrDeleteLinkToLanguagePackDownloadSite;L_ChangeOrDeleteLinkToLanguagePackDownloadSiteID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting affects the language download link under the display and help language section.\n\nIf you enable this policy setting you, you may enter the URL to another location where language packs may be downloaded.\n\nIf you disable this policy setting the URL will be removed.\n\nIf you do not configure this policy setting, the URL will remain available and point to the language pack download site on Office.com.","supportedPlatforms":["Windows"],"tags":["Display Language","Language Preferences","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources","registrySubPath":"disablelanguagepackdownload","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ChangeOrDeleteLinkToLanguagePackDownloadSite;L_ChangeOrDeleteLinkToLanguagePackDownloadSiteID","uniqueId":2036,"displayName":"URL:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting affects the language download link under the display and help language section.\n\nIf you enable this policy setting you, you may enter the URL to another location where language packs may be downloaded.\n\nIf you disable this policy setting the URL will be removed.\n\nIf you do not configure this policy setting, the URL will remain available and point to the language pack download site on Office.com.","supportedPlatforms":["Windows"],"tags":["Display Language","Language Preferences","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources","registrySubPath":"languagepackdownloadaddress","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_ChangeOrDeleteLinkToProofingToolsDownloadSite","uniqueId":2039,"displayName":"Change or delete link to the proofing tools download site","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ChangeOrDeleteLinkToProofingToolsDownloadSite;L_ChangeOrDeleteLinkToProofingToolsDownloadSiteID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting affects the proofing tools link under the Editing language section.\n\nIf you enable this policy setting you, you may enter the URL to another location where proofing tools may be downloaded.\n\nIf you disable this policy setting the URL will be removed.\n\nIf you do not configure this policy setting, the URL will remain available and point to the proofing tools site on Office.com.","supportedPlatforms":["Windows"],"tags":["Display Language","Language Preferences","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources","registrySubPath":"disableproofingtoolsdownload","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ChangeOrDeleteLinkToProofingToolsDownloadSite;L_ChangeOrDeleteLinkToProofingToolsDownloadSiteID","uniqueId":2038,"displayName":"URL:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting affects the proofing tools link under the Editing language section.\n\nIf you enable this policy setting you, you may enter the URL to another location where proofing tools may be downloaded.\n\nIf you disable this policy setting the URL will be removed.\n\nIf you do not configure this policy setting, the URL will remain available and point to the proofing tools site on Office.com.","supportedPlatforms":["Windows"],"tags":["Display Language","Language Preferences","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources","registrySubPath":"proofingtoolsdownloadaddress","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_ChartTemplatesServerLocation","uniqueId":2309,"displayName":"Chart Templates Server Location","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ChartTemplatesServerLocation;L_Location","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the location [URL or UNC] for server-based chart templates.","supportedPlatforms":["Windows"],"tags":["Graph settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ChartTemplatesServerLocation;L_Location","uniqueId":2308,"displayName":"Location:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specifies the location [URL or UNC] for server-based chart templates.","supportedPlatforms":["Windows"],"tags":["Graph settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general\\charttemplates","registrySubPath":"sharedchartslocation","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_CheckActiveXObjects","uniqueId":1704,"displayName":"Check ActiveX objects","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_CheckActiveXObjects;L_CheckActiveXObjectsDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting determines whether Office checks that an ActiveX object is properly categorized before loading it.  \n\nIf you enable this policy setting, you can select one of the following options:\n- Do not check: Office loads ActiveX objects without checking if they are properly categorized.\n- Override IE kill bit list: Office uses the category list to override IE kill bit checks. (This is also the default behavior for this policy setting). \n- Strict allow list: Office only loads properly categorized ActiveX objects.\n\nIf you disable or do not configure this policy setting, Office uses the category list to override IE kill bit checks.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_CheckActiveXObjects;L_CheckActiveXObjectsDropID","uniqueId":1703,"displayName":"Check ActiveX objects","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not check","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Override IE kill bit list","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Strict allow list","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting determines whether Office checks that an ActiveX object is properly categorized before loading it.  \n\nIf you enable this policy setting, you can select one of the following options:\n- Do not check: Office loads ActiveX objects without checking if they are properly categorized.\n- Override IE kill bit list: Office uses the category list to override IE kill bit checks. (This is also the default behavior for this policy setting). \n- Strict allow list: Office only loads properly categorized ActiveX objects.\n\nIf you disable or do not configure this policy setting, Office uses the category list to override IE kill bit checks.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\com categories","registrySubPath":"checkofficeactivex","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CheckExcelRTDServers","uniqueId":1700,"displayName":"Check Excel RTD servers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether Office checks that a RealTimeData (RTD) is properly categorized before loading it. \n\nIf you enable this policy setting Office only loads properly categorized RTD servers.\n\nIf you disable or do not configure this policy setting, Office does not check that an RTD server is properly categorized before loading it.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\com categories","registrySubPath":"checkexcelcreatertd","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CheckfornewactionsURL","uniqueId":1645,"displayName":"Check for new actions URL","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_CheckfornewactionsURL;L_checkfornewactionsurl231","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the \"Check for New Actions\" menu option.\n\nIf you enable this policy setting, and when a URL is specified, a new \"Check for New Actions\" menu option will be added to the \"Additional Actions\" context menu.\n\nIf you disable or do not configure this policy setting, or when it is enabled and a URL is not specified, a \"Check for New Actions\" menu option will not be shown in the \"Additional Actions\" context menu.","supportedPlatforms":["Windows"],"tags":["Additional Actions","Tools | AutoCorrect Options... (Excel, PowerPoint and Access)","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_CheckfornewactionsURL;L_checkfornewactionsurl231","uniqueId":1644,"displayName":"Check for new actions URL","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to configure the \"Check for New Actions\" menu option.\n\nIf you enable this policy setting, and when a URL is specified, a new \"Check for New Actions\" menu option will be added to the \"Additional Actions\" context menu.\n\nIf you disable or do not configure this policy setting, or when it is enabled and a URL is not specified, a \"Check for New Actions\" menu option will not be shown in the \"Additional Actions\" context menu.","supportedPlatforms":["Windows"],"tags":["Additional Actions","Tools | AutoCorrect Options... (Excel, PowerPoint and Access)","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\smart tag","registrySubPath":"checkfornewactions","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_CheckifOfficeisthedefaulteditorforWebpagescreatedinOffice","uniqueId":1661,"displayName":"Check if Office is the default editor for Web pages created in Office","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Files","Tools | Options | General | Web Options...","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"donotcheckifofficeishtmleditor","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CheckOLEObjects","uniqueId":1702,"displayName":"Check OLE objects","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_CheckOLEObjects;L_CheckOLEObjectsDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting determines whether Office checks that an OLE object is properly categorized before loading it.  \n\nIf you enable this policy setting, you can select one of the following options:\n- Do not check: Office loads OLE objects without checking if they are properly categorized.\n- Override IE kill bit list: Office uses the category list to override IE kill bit checks. (This is also the default behavior for this policy setting). \n- Strict allow list: Office only loads properly categorized OLE objects.\n\nIf you disable or do not configure this policy setting, Office uses the category list to override IE kill bit checks.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_CheckOLEObjects;L_CheckOLEObjectsDropID","uniqueId":1701,"displayName":"Check OLE objects","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not check","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Override IE kill bit list","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Strict allow list","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting determines whether Office checks that an OLE object is properly categorized before loading it.  \n\nIf you enable this policy setting, you can select one of the following options:\n- Do not check: Office loads OLE objects without checking if they are properly categorized.\n- Override IE kill bit list: Office uses the category list to override IE kill bit checks. (This is also the default behavior for this policy setting). \n- Strict allow list: Office only loads properly categorized OLE objects.\n\nIf you disable or do not configure this policy setting, Office uses the category list to override IE kill bit checks.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\com categories","registrySubPath":"checkofficeole","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CheckOutToLocalDisk","uniqueId":2525,"displayName":"Check-out to local disk","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy turns on the check-out to local disk feature.\n\nIf you enable this policy setting, documents that are checked-out will be stored in the Local Drafts folder on the local disk.\n\nIf you disable or do not configure this policy setting, documents that are checked out will be checked-out on SharePoint and no local copy will be created.","supportedPlatforms":["Windows"],"tags":["Microsoft Office Document Cache","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\offline\\options","registrySubPath":"uselocaldrafts","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CheckOWCDataSourceProviders","uniqueId":1699,"displayName":"Check OWC data source providers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether Office checks that an Office Web Components (OWC) data source provider is properly categorized before loading it.\n\nIf you enable this policy setting, Office only loads properly categorized data source providers.\n\nIf you disable or do not configure this policy setting, Office does not check that an OWC data source provider is properly categorized before loading it.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\com categories","registrySubPath":"checkowcsafeproviders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CheckTheXAdESPortionsOfADigitalSignature","uniqueId":1712,"displayName":"Check the XAdES portions of a digital signature","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting  lets you  specify whether or not Office 2016 checks the XAdES portions of a digital signature, if present, when validating a digital signature for a document.  \n\nIf you enable this policy setting, Office 2016 checks the XAdES portions of a digital signature when validating it.\n\nIf you disable or do not configure this policy setting, Office 2016 only validates XML-DSig and XAdES-BES portions of a digital signature.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"xadesvalidationlevel","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Cherokee","uniqueId":2080,"displayName":"Cherokee","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Cherokee","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"chr-cher-us","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ChineseHongKongSAR","uniqueId":2082,"displayName":"Chinese (Hong Kong S.A.R.)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Chinese (Hong Kong S.A.R.)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"zh-hk","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ChineseMacaoSAR","uniqueId":2083,"displayName":"Chinese (Macao S.A.R.)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Chinese (Macao S.A.R.)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"zh-mo","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ChinesePRC","uniqueId":2081,"displayName":"Chinese (China)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Chinese (China)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"zh-cn","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ChineseSingapore","uniqueId":2084,"displayName":"Chinese (Singapore)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Chinese (Singapore)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"zh-sg","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ChineseTaiwan","uniqueId":2085,"displayName":"Chinese (Taiwan)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Chinese (Taiwan)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"zh-tw","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CleanupInterval","uniqueId":2577,"displayName":"Set the cleanup interval","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_CleanupInterval;L_CleanupIntervalDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the interval (in minutes) for how long successfully completed operations and other data that is no longer needed will remain in the cache before they can be deleted.  The synchronization process leads to data in the cache that will no longer be needed.  However, the data may be useful for troubleshooting purposes.  To prevent the cache from growing too large, the cache contents should periodically be deleted.\n\nIf you enable this policy setting, you may specify the interval (in minutes) for the times the contents in the cache are deleted.\n\nIf you disable or do not configure this policy setting, a default value of 1440 minutes (1 day) will be used.","supportedPlatforms":["Windows"],"tags":["Synchronization","Business Data","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_CleanupInterval;L_CleanupIntervalDecimal","uniqueId":2576,"displayName":"Cleanup interval (minutes)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":32767},"dataType":"Integer"},"description":"This policy setting allows you to specify the interval (in minutes) for how long successfully completed operations and other data that is no longer needed will remain in the cache before they can be deleted.  The synchronization process leads to data in the cache that will no longer be needed.  However, the data may be useful for troubleshooting purposes.  To prevent the cache from growing too large, the cache contents should periodically be deleted.\n\nIf you enable this policy setting, you may specify the interval (in minutes) for the times the contents in the cache are deleted.\n\nIf you disable or do not configure this policy setting, a default value of 1440 minutes (1 day) will be used.","supportedPlatforms":["Windows"],"tags":["Synchronization","Business Data","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\business data\\synchronization","registrySubPath":"cleanup interval","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CloudOnlySaving","uniqueId":3061,"displayName":"Restrict saving on non-Cloud locations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Word, Excel, and PowerPoint users can use non-cloud locations (local and network) to create new files.\n\nIf you enable this policy setting, users will only have Cloud Locations available to perform SaveAs and Save new files.\n\nIf you disable or don’t configure this policy setting, users can use any location (Cloud, Local, and Network) to perform SaveAs and Save new files.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for Enterprise.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\fileio","registrySubPath":"enablecloudonlysaveasmode","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Combineauxverbadj","uniqueId":1687,"displayName":"Combine aux verb/adj.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option. This option is available only if you are using the Korean language version of Microsoft Office or have installed Microsoft Office 2016 proofing tools or the Microsoft Office Single Language Pack 2016 for Korean, and have enabled support for Korean through Microsoft Office 2016 Language Preferences.","supportedPlatforms":["Windows"],"tags":["Tools | Options | Spelling","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpref","registrySubPath":"fsplauxfind_560_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CompanionAppAutoStart","uniqueId":5314,"displayName":"Prevent Microsoft 365 companions from starting automatically","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_CompanionAppAutoStart;L_PeopleCompanionAppAutoStart","logicalOperator":"exists","values":[]},{"dependee":"office16;L_CompanionAppAutoStart;L_FileSearchCompanionAppAutoStart","logicalOperator":"exists","values":[]},{"dependee":"office16;L_CompanionAppAutoStart;L_CalendarCompanionAppAutoStart","logicalOperator":"exists","values":[]}],"logicalOperator":1}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls whether Microsoft 365 companions start automatically when the user logs into a device after companion apps are installed.\n\nIf you enable this policy setting, companion apps do not start automatically when the user logs into the device.\nNote: If you enable this policy setting, you must do so before Microsoft 365 companions are installed.\n\nWhen a user opens a companion app for the first time, that app is configured to start automatically the next time the user logs into the device.\n\nIf you disable or don't configure this policy setting, the companion apps that the user has opened once, will start automatically when the user logs into the device.\n\nNote: Users can configure Microsoft 365 companions to not start automatically by configuring settings within each companion app or \"Windows Start up Apps\" settings.","supportedPlatforms":["Windows"],"tags":["CompanionAppAutoStart","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_CompanionAppAutoStart;L_CalendarCompanionAppAutoStart","uniqueId":5315,"displayName":"Calendar Companion","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls whether Microsoft 365 companions start automatically when the user logs into a device after companion apps are installed.\n\nIf you enable this policy setting, companion apps do not start automatically when the user logs into the device.\nNote: If you enable this policy setting, you must do so before Microsoft 365 companions are installed.\n\nWhen a user opens a companion app for the first time, that app is configured to start automatically the next time the user logs into the device.\n\nIf you disable or don't configure this policy setting, the companion apps that the user has opened once, will start automatically when the user logs into the device.\n\nNote: Users can configure Microsoft 365 companions to not start automatically by configuring settings within each companion app or \"Windows Start up Apps\" settings.","supportedPlatforms":["Windows"],"tags":["CompanionAppAutoStart","CalendarCompanionAppAutoStart","Cloud Policies Enum","Cloud Policies Composite","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\companions","registrySubPath":"CalendarCompanionAppAutoStart","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CompanionAppAutoStart;L_FileSearchCompanionAppAutoStart","uniqueId":5316,"displayName":"File Search Companion","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls whether Microsoft 365 companions start automatically when the user logs into a device after companion apps are installed.\n\nIf you enable this policy setting, companion apps do not start automatically when the user logs into the device.\nNote: If you enable this policy setting, you must do so before Microsoft 365 companions are installed.\n\nWhen a user opens a companion app for the first time, that app is configured to start automatically the next time the user logs into the device.\n\nIf you disable or don't configure this policy setting, the companion apps that the user has opened once, will start automatically when the user logs into the device.\n\nNote: Users can configure Microsoft 365 companions to not start automatically by configuring settings within each companion app or \"Windows Start up Apps\" settings.","supportedPlatforms":["Windows"],"tags":["CompanionAppAutoStart","FileSearchCompanionAppAutoStart","Cloud Policies Enum","Cloud Policies Composite","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\companions","registrySubPath":"FileSearchCompanionAppAutoStart","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CompanionAppAutoStart;L_PeopleCompanionAppAutoStart","uniqueId":5317,"displayName":"People Companion","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls whether Microsoft 365 companions start automatically when the user logs into a device after companion apps are installed.\n\nIf you enable this policy setting, companion apps do not start automatically when the user logs into the device.\nNote: If you enable this policy setting, you must do so before Microsoft 365 companions are installed.\n\nWhen a user opens a companion app for the first time, that app is configured to start automatically the next time the user logs into the device.\n\nIf you disable or don't configure this policy setting, the companion apps that the user has opened once, will start automatically when the user logs into the device.\n\nNote: Users can configure Microsoft 365 companions to not start automatically by configuring settings within each companion app or \"Windows Start up Apps\" settings.","supportedPlatforms":["Windows"],"tags":["CompanionAppAutoStart","PeopleCompanionAppAutoStart","Cloud Policies Enum","Cloud Policies Composite","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\companions","registrySubPath":"PeopleCompanionAppAutoStart","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CompletelydisabletheSmartDocumentsfeatureinWordandExcel","uniqueId":2471,"displayName":"Completely disable the Smart Documents feature in Word and Excel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to configure the ability to run smart documents in Word or Excel. However, since XML expansion packs can include many types of solutions in addition to smart document solutions, this policy setting cannot be used to disable the ability to run XML expansion packs.\n\nIf you enable this policy setting, smart document solutions will not run.  To fully manage the Smart Documents feature, this policy and the \"Disable Smart Document's use of manifests\" policy should both be configured.\n\nIf you disable or do not configure this policy setting, smart document solutions will run.","supportedPlatforms":["Windows"],"tags":["Smart Documents (Word, Excel)","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\smart tag","registrySubPath":"disablesmartdocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceCreateSharedNotes0","uniqueId":2731,"displayName":"Create Shared Notes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\0","registrySubPath":"createsharednotes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceMajorVersion0","uniqueId":2729,"displayName":"Configure presentation service in PowerPoint and Word 1","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\0","registrySubPath":"majorversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceMinorVersion0","uniqueId":2730,"displayName":"Configure presentation service in PowerPoint and Word 1","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\0","registrySubPath":"minorversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceNotesDefaultUrl0","uniqueId":2733,"displayName":"Shared Notes Default Url (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\0","registrySubPath":"notesdefaulturl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceServerCapabilities0","uniqueId":2728,"displayName":"Server Capabilities flags:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"defaultValue":"0","description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\0","registrySubPath":"servercapabilities","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceServerDescription0","uniqueId":2725,"displayName":"Description (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\0","registrySubPath":"serverinformation","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceServerInfo0","uniqueId":2726,"displayName":"Information URL (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\0","registrySubPath":"serverinformationurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceServerName0","uniqueId":2723,"displayName":"Name:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\0","registrySubPath":"servername","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceServerTerms0","uniqueId":2727,"displayName":"Service agreement URL (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\0","registrySubPath":"servertermsurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceServerURL0","uniqueId":2724,"displayName":"Service URL:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\0","registrySubPath":"serverurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceSharedNotesCustomUrl0","uniqueId":2732,"displayName":"Shared Notes Url (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\0","registrySubPath":"sharednotescustomurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService00","uniqueId":2734,"displayName":"Configure presentation service in PowerPoint and Word 1","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceServerName0","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceServerURL0","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceServerDescription0","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceServerInfo0","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceServerTerms0","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceServerCapabilities0","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceMajorVersion0","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceMinorVersion0","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceCreateSharedNotes0","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceSharedNotesCustomUrl0","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService00;L_BroadcastServiceNotesDefaultUrl0","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceCreateSharedNotes1","uniqueId":2743,"displayName":"Create Shared Notes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\1","registrySubPath":"createsharednotes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceMajorVersion1","uniqueId":2741,"displayName":"Configure presentation service in PowerPoint and Word 2","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\1","registrySubPath":"majorversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceMinorVersion1","uniqueId":2742,"displayName":"Configure presentation service in PowerPoint and Word 2","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\1","registrySubPath":"minorversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceNotesDefaultUrl1","uniqueId":2745,"displayName":"Shared Notes Default Url (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\1","registrySubPath":"notesdefaulturl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceServerCapabilities1","uniqueId":2740,"displayName":"Server Capabilities flags:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"defaultValue":"0","description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\1","registrySubPath":"servercapabilities","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceServerDescription1","uniqueId":2737,"displayName":"Description (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\1","registrySubPath":"serverinformation","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceServerInfo1","uniqueId":2738,"displayName":"Information URL (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\1","registrySubPath":"serverinformationurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceServerName1","uniqueId":2735,"displayName":"Name:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\1","registrySubPath":"servername","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceServerTerms1","uniqueId":2739,"displayName":"Service agreement URL (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\1","registrySubPath":"servertermsurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceServerURL1","uniqueId":2736,"displayName":"Service URL:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\1","registrySubPath":"serverurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceSharedNotesCustomUrl1","uniqueId":2744,"displayName":"Shared Notes Url (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\1","registrySubPath":"sharednotescustomurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService01","uniqueId":2746,"displayName":"Configure presentation service in PowerPoint and Word 2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceServerName1","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceServerURL1","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceServerDescription1","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceServerInfo1","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceServerTerms1","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceServerCapabilities1","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceMajorVersion1","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceMinorVersion1","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceCreateSharedNotes1","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceSharedNotesCustomUrl1","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService01;L_BroadcastServiceNotesDefaultUrl1","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceCreateSharedNotes2","uniqueId":2755,"displayName":"Create Shared Notes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\2","registrySubPath":"createsharednotes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceMajorVersion2","uniqueId":2753,"displayName":"Configure presentation service in PowerPoint and Word 3","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\2","registrySubPath":"majorversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceMinorVersion2","uniqueId":2754,"displayName":"Configure presentation service in PowerPoint and Word 3","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\2","registrySubPath":"minorversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceNotesDefaultUrl2","uniqueId":2757,"displayName":"Shared Notes Default Url (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\2","registrySubPath":"notesdefaulturl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceServerCapabilities2","uniqueId":2752,"displayName":"Server Capabilities flags:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"defaultValue":"0","description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\2","registrySubPath":"servercapabilities","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceServerDescription2","uniqueId":2749,"displayName":"Description (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\2","registrySubPath":"serverinformation","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceServerInfo2","uniqueId":2750,"displayName":"Information URL (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\2","registrySubPath":"serverinformationurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceServerName2","uniqueId":2747,"displayName":"Name:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\2","registrySubPath":"servername","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceServerTerms2","uniqueId":2751,"displayName":"Service agreement URL (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\2","registrySubPath":"servertermsurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceServerURL2","uniqueId":2748,"displayName":"Service URL:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\2","registrySubPath":"serverurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceSharedNotesCustomUrl2","uniqueId":2756,"displayName":"Shared Notes Url (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\2","registrySubPath":"sharednotescustomurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService02","uniqueId":2758,"displayName":"Configure presentation service in PowerPoint and Word 3","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceServerName2","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceServerURL2","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceServerDescription2","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceServerInfo2","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceServerTerms2","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceServerCapabilities2","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceMajorVersion2","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceMinorVersion2","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceCreateSharedNotes2","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceSharedNotesCustomUrl2","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService02;L_BroadcastServiceNotesDefaultUrl2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceCreateSharedNotes3","uniqueId":2767,"displayName":"Create Shared Notes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\3","registrySubPath":"createsharednotes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceMajorVersion3","uniqueId":2765,"displayName":"Configure presentation service in PowerPoint and Word 4","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\3","registrySubPath":"majorversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceMinorVersion3","uniqueId":2766,"displayName":"Configure presentation service in PowerPoint and Word 4","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\3","registrySubPath":"minorversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceNotesDefaultUrl3","uniqueId":2769,"displayName":"Shared Notes Default Url (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\3","registrySubPath":"notesdefaulturl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceServerCapabilities3","uniqueId":2764,"displayName":"Server Capabilities flags:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"defaultValue":"0","description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\3","registrySubPath":"servercapabilities","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceServerDescription3","uniqueId":2761,"displayName":"Description (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\3","registrySubPath":"serverinformation","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceServerInfo3","uniqueId":2762,"displayName":"Information URL (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\3","registrySubPath":"serverinformationurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceServerName3","uniqueId":2759,"displayName":"Name:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\3","registrySubPath":"servername","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceServerTerms3","uniqueId":2763,"displayName":"Service agreement URL (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\3","registrySubPath":"servertermsurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceServerURL3","uniqueId":2760,"displayName":"Service URL:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\3","registrySubPath":"serverurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceSharedNotesCustomUrl3","uniqueId":2768,"displayName":"Shared Notes Url (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\3","registrySubPath":"sharednotescustomurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService03","uniqueId":2770,"displayName":"Configure presentation service in PowerPoint and Word 4","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceServerName3","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceServerURL3","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceServerDescription3","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceServerInfo3","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceServerTerms3","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceServerCapabilities3","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceMajorVersion3","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceMinorVersion3","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceCreateSharedNotes3","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceSharedNotesCustomUrl3","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService03;L_BroadcastServiceNotesDefaultUrl3","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceCreateSharedNotes4","uniqueId":2779,"displayName":"Create Shared Notes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\4","registrySubPath":"createsharednotes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceMajorVersion4","uniqueId":2777,"displayName":"Configure presentation service in PowerPoint and Word 5","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\4","registrySubPath":"majorversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceMinorVersion4","uniqueId":2778,"displayName":"Configure presentation service in PowerPoint and Word 5","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\4","registrySubPath":"minorversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceNotesDefaultUrl4","uniqueId":2781,"displayName":"Shared Notes Default Url (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\4","registrySubPath":"notesdefaulturl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceServerCapabilities4","uniqueId":2776,"displayName":"Server Capabilities flags:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"defaultValue":"0","description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\4","registrySubPath":"servercapabilities","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceServerDescription4","uniqueId":2773,"displayName":"Description (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\4","registrySubPath":"serverinformation","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceServerInfo4","uniqueId":2774,"displayName":"Information URL (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\4","registrySubPath":"serverinformationurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceServerName4","uniqueId":2771,"displayName":"Name:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\4","registrySubPath":"servername","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceServerTerms4","uniqueId":2775,"displayName":"Service agreement URL (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\4","registrySubPath":"servertermsurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceServerURL4","uniqueId":2772,"displayName":"Service URL:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\4","registrySubPath":"serverurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceSharedNotesCustomUrl4","uniqueId":2780,"displayName":"Shared Notes Url (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\4","registrySubPath":"sharednotescustomurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService04","uniqueId":2782,"displayName":"Configure presentation service in PowerPoint and Word 5","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceServerName4","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceServerURL4","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceServerDescription4","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceServerInfo4","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceServerTerms4","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceServerCapabilities4","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceMajorVersion4","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceMinorVersion4","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceCreateSharedNotes4","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceSharedNotesCustomUrl4","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService04;L_BroadcastServiceNotesDefaultUrl4","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceCreateSharedNotes5","uniqueId":2791,"displayName":"Create Shared Notes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\5","registrySubPath":"createsharednotes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceMajorVersion5","uniqueId":2789,"displayName":"Configure presentation service in PowerPoint and Word 6","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\5","registrySubPath":"majorversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceMinorVersion5","uniqueId":2790,"displayName":"Configure presentation service in PowerPoint and Word 6","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\5","registrySubPath":"minorversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceNotesDefaultUrl5","uniqueId":2793,"displayName":"Shared Notes Default Url (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\5","registrySubPath":"notesdefaulturl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceServerCapabilities5","uniqueId":2788,"displayName":"Server Capabilities flags:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"defaultValue":"0","description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\5","registrySubPath":"servercapabilities","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceServerDescription5","uniqueId":2785,"displayName":"Description (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\5","registrySubPath":"serverinformation","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceServerInfo5","uniqueId":2786,"displayName":"Information URL (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\5","registrySubPath":"serverinformationurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceServerName5","uniqueId":2783,"displayName":"Name:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\5","registrySubPath":"servername","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceServerTerms5","uniqueId":2787,"displayName":"Service agreement URL (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\5","registrySubPath":"servertermsurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceServerURL5","uniqueId":2784,"displayName":"Service URL:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\5","registrySubPath":"serverurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceSharedNotesCustomUrl5","uniqueId":2792,"displayName":"Shared Notes Url (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\5","registrySubPath":"sharednotescustomurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService05","uniqueId":2794,"displayName":"Configure presentation service in PowerPoint and Word 6","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceServerName5","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceServerURL5","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceServerDescription5","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceServerInfo5","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceServerTerms5","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceServerCapabilities5","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceMajorVersion5","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceMinorVersion5","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceCreateSharedNotes5","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceSharedNotesCustomUrl5","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService05;L_BroadcastServiceNotesDefaultUrl5","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceCreateSharedNotes6","uniqueId":2803,"displayName":"Create Shared Notes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\6","registrySubPath":"createsharednotes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceMajorVersion6","uniqueId":2801,"displayName":"Configure presentation service in PowerPoint and Word 7","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\6","registrySubPath":"majorversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceMinorVersion6","uniqueId":2802,"displayName":"Configure presentation service in PowerPoint and Word 7","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\6","registrySubPath":"minorversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceNotesDefaultUrl6","uniqueId":2805,"displayName":"Shared Notes Default Url (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\6","registrySubPath":"notesdefaulturl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceServerCapabilities6","uniqueId":2800,"displayName":"Server Capabilities flags:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"defaultValue":"0","description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\6","registrySubPath":"servercapabilities","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceServerDescription6","uniqueId":2797,"displayName":"Description (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\6","registrySubPath":"serverinformation","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceServerInfo6","uniqueId":2798,"displayName":"Information URL (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\6","registrySubPath":"serverinformationurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceServerName6","uniqueId":2795,"displayName":"Name:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\6","registrySubPath":"servername","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceServerTerms6","uniqueId":2799,"displayName":"Service agreement URL (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\6","registrySubPath":"servertermsurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceServerURL6","uniqueId":2796,"displayName":"Service URL:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\6","registrySubPath":"serverurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceSharedNotesCustomUrl6","uniqueId":2804,"displayName":"Shared Notes Url (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\6","registrySubPath":"sharednotescustomurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService06","uniqueId":2806,"displayName":"Configure presentation service in PowerPoint and Word 7","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceServerName6","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceServerURL6","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceServerDescription6","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceServerInfo6","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceServerTerms6","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceServerCapabilities6","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceMajorVersion6","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceMinorVersion6","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceCreateSharedNotes6","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceSharedNotesCustomUrl6","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService06;L_BroadcastServiceNotesDefaultUrl6","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceCreateSharedNotes7","uniqueId":2815,"displayName":"Create Shared Notes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\7","registrySubPath":"createsharednotes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceMajorVersion7","uniqueId":2813,"displayName":"Configure presentation service in PowerPoint and Word 8","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\7","registrySubPath":"majorversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceMinorVersion7","uniqueId":2814,"displayName":"Configure presentation service in PowerPoint and Word 8","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\7","registrySubPath":"minorversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceNotesDefaultUrl7","uniqueId":2817,"displayName":"Shared Notes Default Url (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\7","registrySubPath":"notesdefaulturl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceServerCapabilities7","uniqueId":2812,"displayName":"Server Capabilities flags:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"defaultValue":"0","description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\7","registrySubPath":"servercapabilities","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceServerDescription7","uniqueId":2809,"displayName":"Description (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\7","registrySubPath":"serverinformation","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceServerInfo7","uniqueId":2810,"displayName":"Information URL (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\7","registrySubPath":"serverinformationurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceServerName7","uniqueId":2807,"displayName":"Name:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\7","registrySubPath":"servername","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceServerTerms7","uniqueId":2811,"displayName":"Service agreement URL (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\7","registrySubPath":"servertermsurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceServerURL7","uniqueId":2808,"displayName":"Service URL:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\7","registrySubPath":"serverurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceSharedNotesCustomUrl7","uniqueId":2816,"displayName":"Shared Notes Url (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\7","registrySubPath":"sharednotescustomurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService07","uniqueId":2818,"displayName":"Configure presentation service in PowerPoint and Word 8","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceServerName7","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceServerURL7","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceServerDescription7","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceServerInfo7","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceServerTerms7","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceServerCapabilities7","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceMajorVersion7","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceMinorVersion7","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceCreateSharedNotes7","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceSharedNotesCustomUrl7","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService07;L_BroadcastServiceNotesDefaultUrl7","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceCreateSharedNotes8","uniqueId":2827,"displayName":"Create Shared Notes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\8","registrySubPath":"createsharednotes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceMajorVersion8","uniqueId":2825,"displayName":"Configure presentation service in PowerPoint and Word 9","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\8","registrySubPath":"majorversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceMinorVersion8","uniqueId":2826,"displayName":"Configure presentation service in PowerPoint and Word 9","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\8","registrySubPath":"minorversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceNotesDefaultUrl8","uniqueId":2829,"displayName":"Shared Notes Default Url (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\8","registrySubPath":"notesdefaulturl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceServerCapabilities8","uniqueId":2824,"displayName":"Server Capabilities flags:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"defaultValue":"0","description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\8","registrySubPath":"servercapabilities","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceServerDescription8","uniqueId":2821,"displayName":"Description (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\8","registrySubPath":"serverinformation","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceServerInfo8","uniqueId":2822,"displayName":"Information URL (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\8","registrySubPath":"serverinformationurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceServerName8","uniqueId":2819,"displayName":"Name:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\8","registrySubPath":"servername","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceServerTerms8","uniqueId":2823,"displayName":"Service agreement URL (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\8","registrySubPath":"servertermsurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceServerURL8","uniqueId":2820,"displayName":"Service URL:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\8","registrySubPath":"serverurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceSharedNotesCustomUrl8","uniqueId":2828,"displayName":"Shared Notes Url (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\8","registrySubPath":"sharednotescustomurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService08","uniqueId":2830,"displayName":"Configure presentation service in PowerPoint and Word 9","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceServerName8","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceServerURL8","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceServerDescription8","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceServerInfo8","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceServerTerms8","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceServerCapabilities8","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceMajorVersion8","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceMinorVersion8","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceCreateSharedNotes8","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceSharedNotesCustomUrl8","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService08;L_BroadcastServiceNotesDefaultUrl8","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceCreateSharedNotes9","uniqueId":2839,"displayName":"Create Shared Notes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\9","registrySubPath":"createsharednotes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceMajorVersion9","uniqueId":2837,"displayName":"Configure presentation service in PowerPoint and Word 10","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\9","registrySubPath":"majorversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceMinorVersion9","uniqueId":2838,"displayName":"Configure presentation service in PowerPoint and Word 10","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\9","registrySubPath":"minorversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceNotesDefaultUrl9","uniqueId":2841,"displayName":"Shared Notes Default Url (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\9","registrySubPath":"notesdefaulturl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceServerCapabilities9","uniqueId":2836,"displayName":"Server Capabilities flags:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"defaultValue":"0","description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\9","registrySubPath":"servercapabilities","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceServerDescription9","uniqueId":2833,"displayName":"Description (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\9","registrySubPath":"serverinformation","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceServerInfo9","uniqueId":2834,"displayName":"Information URL (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\9","registrySubPath":"serverinformationurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceServerName9","uniqueId":2831,"displayName":"Name:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\9","registrySubPath":"servername","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceServerTerms9","uniqueId":2835,"displayName":"Service agreement URL (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\9","registrySubPath":"servertermsurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceServerURL9","uniqueId":2832,"displayName":"Service URL:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\9","registrySubPath":"serverurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceSharedNotesCustomUrl9","uniqueId":2840,"displayName":"Shared Notes Url (optional):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast\\servers\\9","registrySubPath":"sharednotescustomurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConfigureBroadcastService09","uniqueId":2842,"displayName":"Configure presentation service in PowerPoint and Word 10","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceServerName9","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceServerURL9","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceServerDescription9","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceServerInfo9","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceServerTerms9","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceServerCapabilities9","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceMajorVersion9","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceMinorVersion9","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceCreateSharedNotes9","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceSharedNotesCustomUrl9","logicalOperator":"exists","values":null},{"dependee":"office16;L_ConfigureBroadcastService09;L_BroadcastServiceNotesDefaultUrl9","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to add a presentation service to the list of online presentation services in PowerPoint and Word. This list appears when a user selects the More services link under Present Online on the Share tab in Backstage view in PowerPoint and Word and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, you can add a presentation service to the list of online presentation services in PowerPoint and Word. For each service you add, you must specify a name and URL. Optionally, you can specify a description, the URL of a web page with more information about the service, and the URL of a web page with service terms that the user can display by selecting the Service Agreement link. \n\nIf you disable or do not configure this policy setting, the More services link displays only services that are manually added by users.","supportedPlatforms":["Windows"],"tags":["Presentation Services","Present Online","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ConfigureGetDiagnostics","uniqueId":3058,"displayName":"Configure Get Diagnostics feature's visibility in the Help Ribbon in Office applications and control the feature's mode of operation.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ConfigureGetDiagnostics;L_ConfigureGetDiagnosticsEnum","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to enable or disable Get Diagnostics in Office applications and specifies the mode in which the feature operates.\n\nIf you enable this policy setting, you must choose one of the following options:\nDisabled\nEnable upload of diagnostics logs to Microsoft\nEnable the collection of diagnostic logs in an archive\n\nIf you select \"Disabled\", Office applications will not display a visible Get Diagnostics button in the Help Ribbon.\n\nIf you select \"Enable upload of diagnostics logs to Microsoft\", Office applications will have a visible Get Diagnostics button in the Help Ribbon. Clicking this button will upload the application’s diagnostic logs to Microsoft for support purposes.\n\nIf you select \"Enable the collection of diagnostic logs in an archive\", Office applications will have a visible Get Diagnostics button in the Help Ribbon. Clicking this button will capture the application’s diagnostic logs in a file archive on the device where the application is currently running. These logs will not be uploaded to Microsoft.\n\nPlease note that the option “Enable the collection of diagnostic logs in an archive” may not be applicable in certain Office applications. When the application does not support local log collection, setting the policy to this option will completely disable the feature, removing the \"Get Diagnostics\" button.\n\nIf you don’t set this policy, the feature will operate in the default mode, which is “Enable upload of diagnostics logs to Microsoft.”\n      ","supportedPlatforms":["Windows","Web"],"tags":["Diagnostics","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ConfigureGetDiagnostics;L_ConfigureGetDiagnosticsEnum","uniqueId":3057,"displayName":"Configure Get Diagnostics:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Upload diagnostic logs to Microsoft","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Capture diagnostic logs in a local archive, dont upload logs to Microsoft","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This policy setting allows you to enable or disable Get Diagnostics in Office applications and specifies the mode in which the feature operates.\n\nIf you enable this policy setting, you must choose one of the following options:\nDisabled\nEnable upload of diagnostics logs to Microsoft\nEnable the collection of diagnostic logs in an archive\n\nIf you select \"Disabled\", Office applications will not display a visible Get Diagnostics button in the Help Ribbon.\n\nIf you select \"Enable upload of diagnostics logs to Microsoft\", Office applications will have a visible Get Diagnostics button in the Help Ribbon. Clicking this button will upload the application’s diagnostic logs to Microsoft for support purposes.\n\nIf you select \"Enable the collection of diagnostic logs in an archive\", Office applications will have a visible Get Diagnostics button in the Help Ribbon. Clicking this button will capture the application’s diagnostic logs in a file archive on the device where the application is currently running. These logs will not be uploaded to Microsoft.\n\nPlease note that the option “Enable the collection of diagnostic logs in an archive” may not be applicable in certain Office applications. When the application does not support local log collection, setting the policy to this option will completely disable the feature, removing the \"Get Diagnostics\" button.\n\nIf you don’t set this policy, the feature will operate in the default mode, which is “Enable upload of diagnostics logs to Microsoft.”\n      ","supportedPlatforms":["Windows","Web"],"tags":["Diagnostics","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\diagnostics","registrySubPath":"configuregetdiagnostics","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigurePreCreateInApplicationGuard","uniqueId":1767,"displayName":"Configure Application Guard container precreation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ConfigurePreCreateInApplicationGuard;L_SetAppGuardPreWarmWindowValue","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting determines if the Application Guard container, for isolating untrusted files, is pre-created for improved run time performance.\n\nIf you enable this policy setting, you can specify the number of days to continue pre-creating an Application Guard container if the user has not opened a file with Application Guard. Pre-creating a container when the user logs in will decrease the wait time when opening an untrusted file.\n\n“65535” will configure Office to always create an Application Guard container when a user logs into Windows.\n\"20\" will configure Office to pre-create the container each time a user logs into Windows for up to 20 days after the last time the user opened an untrusted file using Application Guard.\n“0” will configure Office to never pre-create the container. Instead the container will only be created when a user opens their first untrusted file after logging into Windows.\n\nNote: if you configure Office to never pre-create a container then users will experience a longer wait when opening an untrusted file after logging into Windows.\n\nIf you disable or don’t configure this setting, Office will use a built-in heuristic to pre-create the container.\n\nNote: This policy setting only applies to Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Application Guard","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ConfigurePreCreateInApplicationGuard;L_SetAppGuardPreWarmWindowValue","uniqueId":1766,"displayName":"Pre-Create Window (days):","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":65536},"dataType":"Integer"},"description":"This policy setting determines if the Application Guard container, for isolating untrusted files, is pre-created for improved run time performance.\n\nIf you enable this policy setting, you can specify the number of days to continue pre-creating an Application Guard container if the user has not opened a file with Application Guard. Pre-creating a container when the user logs in will decrease the wait time when opening an untrusted file.\n\n“65535” will configure Office to always create an Application Guard container when a user logs into Windows.\n\"20\" will configure Office to pre-create the container each time a user logs into Windows for up to 20 days after the last time the user opened an untrusted file using Application Guard.\n“0” will configure Office to never pre-create the container. Instead the container will only be created when a user opens their first untrusted file after logging into Windows.\n\nNote: if you configure Office to never pre-create a container then users will experience a longer wait when opening an untrusted file after logging into Windows.\n\nIf you disable or don’t configure this setting, Office will use a built-in heuristic to pre-create the container.\n\nNote: This policy setting only applies to Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Application Guard","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\applicationguard","registrySubPath":"prewarmwindow","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigurePresenceIcons","uniqueId":2323,"displayName":"Configure presence icons","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ConfigurePresenceIcons;L_ConfigurePresenceIconsDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify whether Microsoft Office applications display presence icons in the user interface (UI).\n\nIf you enable this policy setting, you may specify when applications display presence icons:\n\n- Display all: Presence icons are displayed in the UI.\n- Display some: Presence icons are displayed only in the Contact Card, Quick Contacts and SharePoint.\n- Display none: Presence icons are not displayed in the UI.\n\nIf you disable or you do not configure this policy setting, presence icons are displayed in the UI.","supportedPlatforms":["Mac","Web","iOS","Android","Windows"],"tags":["Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ConfigurePresenceIcons;L_ConfigurePresenceIconsDropID","uniqueId":2322,"displayName":"Configure presence icons","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Display all","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Display some","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Display none","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify whether Microsoft Office applications display presence icons in the user interface (UI).\n\nIf you enable this policy setting, you may specify when applications display presence icons:\n\n- Display all: Presence icons are displayed in the UI.\n- Display some: Presence icons are displayed only in the Contact Card, Quick Contacts and SharePoint.\n- Display none: Presence icons are not displayed in the UI.\n\nIf you disable or you do not configure this policy setting, presence icons are displayed in the UI.","supportedPlatforms":["Mac","Web","iOS","Android","Windows"],"tags":["Contact Card","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Mac","iOS","Android","Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\im","registrySubPath":"turnoffpresenceicon","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConfigureTimeStampingHashingAlgorithm","uniqueId":1718,"displayName":"Configure time stamping hashing algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ConfigureTimeStampingHashingAlgorithm;L_ConfigureTimeStampingHashingAlgorithmDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the time stamping hashing algorithm used by Office 2016 applications to validate a message or document.\n \nIf you enable this policy setting, you can specify any of the following standard hashing algorithm (SHA) functions:\n- SHA1\n- SHA256\n- SHA384\n- SHA512\n\nIf you disable or do not configure this policy setting, SHA1 will be used.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ConfigureTimeStampingHashingAlgorithm;L_ConfigureTimeStampingHashingAlgorithmDropID","uniqueId":1717,"displayName":"Configure time stamping hashing algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"sha1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA1","description":"","tags":[],"dependencyGroup":null},{"value":"sha256","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA256","description":"","tags":[],"dependencyGroup":null},{"value":"sha384","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA384","description":"","tags":[],"dependencyGroup":null},{"value":"sha512","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA512","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"sha1","description":"This policy setting allows you to configure the time stamping hashing algorithm used by Office 2016 applications to validate a message or document.\n \nIf you enable this policy setting, you can specify any of the following standard hashing algorithm (SHA) functions:\n- SHA1\n- SHA256\n- SHA384\n- SHA512\n\nIf you disable or do not configure this policy setting, SHA1 will be used.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"timestamphashalg","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ConnectedOfficeExperiences","uniqueId":2948,"displayName":"Allow the use of connected experiences in Office","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy setting allows you to control whether connected experiences are available to your users when they're using Office.\n\nConnected experiences include experiences that analyze content, such as Editor in Word, experiences that download online content, such as PowerPoint QuickStarter, and other connected experiences, such as document co-authoring and online file storage. It also includes additional optional connected experiences, such as inserting an online video into a PowerPoint presentation or the 3D Maps feature in Excel, which uses Bing. See the Note at the end for more information about other policy settings that you can use to control these connected experiences.\n\nIf you enable this policy setting, these connected experiences will be available to your users.\n\nIf you disable this policy setting, these connected experiences won't be available to your users.\n\nNote: If you disable this policy setting, nearly all connected experiences will be turned off.  However, limited Office functionality will remain available, such as synching a mailbox in Outlook. Essential services, such as the licensing service that confirms that you’re properly licensed to use Office, will also remain available.\n\nIf you don't configure this policy setting, these connected experiences will be available to your users.\n\nNote: You can use these other policy settings if you want to disable just a certain group of connected experiences: \"Allow the use of connected experiences in Office that analyze content\", \"Allow the use of connected experiences in Office that download online content\", and \"Allow the use of additional optional connected experiences in Office\".\n\nFor more information, see https://go.microsoft.com/fwlink/p/?linkid=2085689","supportedPlatforms":["Windows","Mac"],"tags":["Trust Center","Privacy","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies","Copilot"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\privacy","registrySubPath":"disconnectedstate","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ControlBlogging","uniqueId":2698,"displayName":"Control Blogging","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ControlBlogging;L_empty503","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls whether users can compose and post blog entries from Word.\n\nIf you enable this policy setting, you can choose from three options for controlling blogging: \n\n* Enabled - Users may compose and post blog entries from Word to any available blog provider. This is the default configuration in Word. \n\n* Only SharePoint blogs allowed - Users can only post blog entries to SharePoint sites. \n\n* Disabled - The blogging feature in Word is disabled entirely. \n\nIf you disable or do not configure this policy setting, the behavior is the equivalent of setting the policy to Enabled-Enabled.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ControlBlogging;L_empty503","uniqueId":2697,"displayName":"Control Blogging","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Only SharePoint blogs allowed","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"All blogging disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls whether users can compose and post blog entries from Word.\n\nIf you enable this policy setting, you can choose from three options for controlling blogging: \n\n* Enabled - Users may compose and post blog entries from Word to any available blog provider. This is the default configuration in Word. \n\n* Only SharePoint blogs allowed - Users can only post blog entries to SharePoint sites. \n\n* Disabled - The blogging feature in Word is disabled entirely. \n\nIf you disable or do not configure this policy setting, the behavior is the equivalent of setting the policy to Enabled-Enabled.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\blog","registrySubPath":"disableblog","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ControlCopilotAutoOpen","uniqueId":5318,"displayName":"Auto-open Copilot pane in Microsoft 365 Apps","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the Copilot pane automatically opens when Word, Excel, Powerpoint, and Outlook are opened.\n\nIf you enable or don’t configure this policy setting, the Copilot pane will automatically open when the application is started.\n\nIf you disable this policy setting, the Copilot pane will not automatically open when the application is opened.\n\nNote: The user might be notified that this setting is controlled by their administrator.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for Enterprise.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["ControlCopilotAutoOpen","Cloud Policies Boolean","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"ControlCopilotAutoOpen","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ConversionServicesoptions","uniqueId":1678,"displayName":"Conversion Service Options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ConversionServicesoptions;L_ConversionServicesoptions236","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls users' access to the online features of Office 2016.","supportedPlatforms":["Windows"],"tags":["Conversion Service","Tools | Options | General | Service Options...","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ConversionServicesoptions;L_ConversionServicesoptions236","uniqueId":1677,"displayName":"Conversion Service options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not allow to use Microsoft Conversion Service","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow to use Microsoft Conversion Service","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls users' access to the online features of Office 2016.","supportedPlatforms":["Windows"],"tags":["Conversion Service","Tools | Options | General | Service Options...","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"useconversionservices","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CopilotAdmin","uniqueId":5319,"displayName":"Control Admin Copilot availability in Microsoft 365 Admin Center","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether tenant admins can use Copilot in the Microsoft 365 Admin Center.\n\nIf you enable this policy setting, tenant admins can access and use Admin Copilot in the Microsoft 365 Admin Center.\n\nIf you disable this policy setting, tenant admins will not be able to access Admin Copilot in the Microsoft 365 Admin Center.\n\nIf you don't configure this policy setting, tenant admins can access and use Admin Copilot in the Microsoft 365 Admin Center.","supportedPlatforms":["Web"],"tags":["CopilotAdmin","Cloud Policies Boolean","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"CopilotAdmin","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CopilotAIDisclaimer","uniqueId":5320,"displayName":"Copilot AI Disclaimer","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_CopilotAIDisclaimer;L_CopilotAIDisclaimer","logicalOperator":"exists","values":[]},{"dependee":"office16;L_CopilotAIDisclaimer;L_CopilotAIDisclaimerURL","logicalOperator":"exists","values":[]}],"logicalOperator":1}}]},"dataType":"Composite"},"description":"This policy controls how the Copilot disclaimer \"AI results may be inaccurate\" is displayed to the user, toggling between (a) default AI disclaimer experience (b) AI disclaimer displayed in bold text with an added tooltip and optional link to your organization's AI use policy.\n\nIf you enable this policy setting, users will see the Copilot disclaimer displayed in bold text with an added tooltip and optional link to your organization's AI use policy.\n\nIf you disable or don't configure this policy setting, users will see the default AI disclaimer \"AI results may be inaccurate\" displayed.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["CopilotAIDisclaimer","Cloud Policies Boolean","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_CopilotAIDisclaimer;L_CopilotAIDisclaimer","uniqueId":5321,"displayName":"Choose whether to display an AI disclaimer: ","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Display disclaimer","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Don't display disclaimer","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy controls how the Copilot disclaimer \"AI results may be inaccurate\" is displayed to the user, toggling between (a) default AI disclaimer experience (b) AI disclaimer displayed in bold text with an added tooltip and optional link to your organization's AI use policy.\n\nIf you enable this policy setting, users will see the Copilot disclaimer displayed in bold text with an added tooltip and optional link to your organization's AI use policy.\n\nIf you disable or don't configure this policy setting, users will see the default AI disclaimer \"AI results may be inaccurate\" displayed.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["CopilotAIDisclaimer","Copilot","Cloud Policies Boolean","Cloud Policies Composite","10/21/2025","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"CopilotAIDisclaimer","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CopilotAIDisclaimer;L_CopilotAIDisclaimerURL","uniqueId":5322,"displayName":"Provide a URL that is available from the tooltip: ","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy controls how the Copilot disclaimer \"AI results may be inaccurate\" is displayed to the user, toggling between (a) default AI disclaimer experience (b) AI disclaimer displayed in bold text with an added tooltip and optional link to your organization's AI use policy.\n\nIf you enable this policy setting, users will see the Copilot disclaimer displayed in bold text with an added tooltip and optional link to your organization's AI use policy.\n\nIf you disable or don't configure this policy setting, users will see the default AI disclaimer \"AI results may be inaccurate\" displayed.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["CopilotAIDisclaimer","Copilot","Cloud Policies Text","Cloud Policies Composite","10/21/2025","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"CopilotAIDisclaimerURL","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_CopilotAIWatermark","uniqueId":5323,"displayName":"Include a watermark when content from Microsoft 365 is generated or altered by AI","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls whether videos or audio files your users create with Microsoft 365 include a visual or audio watermark that indicates the content was generated or altered by AI.\n\nBy default, a watermark is not added to videos or audio files generated or altered by using AI in Microsoft 365.\n\nNote: You can't customize the placement or the wording of the watermark.\n\nIf you enable this policy, a watermark is added to videos or audio files generated or altered by using AI in Microsoft 365.\n\nIf you disable or don't configure this policy, a watermark is not added to videos or audio files generated or altered by using AI in Microsoft 365.\n\nNote: Regardless of how you configure this policy, additional info is added to the metadata of videos or audio files to indicate that the content was generated or altered by using AI in Microsoft 365.\n\nFor more information, see https://go.microsoft.com/fwlink/p/?linkid=2339027\n\n","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["CopilotAIWatermark","Copilot","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"CopilotAIWatermark","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CopilotBlockAccessToCameraSharing","uniqueId":5324,"displayName":"Prevent users from sharing their camera with Microsoft 365 Copilot","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can share their camera with Microsoft 365 Copilot to ask Copilot questions in chat about video captured by their camera. Copilot can perform tasks like guide users through tasks and capture ideas from a whiteboard.\n\nIf you enable this policy setting, users will not be able to share their camera with Microsoft 365 Copilot.\n\nIf you disable or don't configure this policy setting, users will be able to share their camera with Microsoft 365 Copilot.\n\nThis policy only applies to licensed Copilot users.\n\nFor more information, see https://go.microsoft.com/fwlink/?linkid=2346301","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["CopilotBlockAccessToCameraSharing","Privacy","Cloud Policies Boolean","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"CopilotBlockAccessToCameraSharing","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CopilotBlockAccessToOpenFiles","uniqueId":5325,"displayName":"Block Copilot Access to Open Content","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users interacting with a file in eligible Microsoft 365 apps can ask Copilot questions about that file, like summaries, key action items, or rewrites.\n\nIf you enable this policy setting (i.e., enable the block) Copilot will not have access to the file currently open in the Microsoft 365 app when responding to user prompts. For Outlook, this setting blocks all entry points to Copilot Chat.\n\nIf you disable or don't configure this policy setting (i.e., disable the block), Copilot will have access to the file currently open in the Microsoft 365 app when responding to user prompts.\n\nThis policy only applies to unlicensed Copilot users.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["CopilotBlockAccessToOpenFiles","Cloud Policies Boolean","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"CopilotBlockAccessToOpenFiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CopilotBlockAccessToScreenSharing","uniqueId":5326,"displayName":"Prevent users from sharing their screen with Microsoft 365 Copilot","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can share their screen with Microsoft 365 Copilot to ask Copilot questions in chat about the information on their screen. Copilot can perform tasks like guide users through tasks and suggest edits for shared content.\n\nIf you enable this policy setting, users will not be able to share their screen with Microsoft 365 Copilot.\n\nIf you disable or don't configure this policy setting, users will be able to share their screen with Microsoft 365 Copilot.\n\nThis policy only applies to licensed Copilot users.\n\nFor more information, see https://go.microsoft.com/fwlink/?linkid=2346301","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["CopilotBlockAccessToScreenSharing","Privacy","Cloud Policies Boolean","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"CopilotBlockAccessToScreenSharing","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CopilotBlockVideoGeneration","uniqueId":5327,"displayName":"Copilot Video Generation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control access to generative-AI video creation features in Video Creator and M365 apps.\n\nIf you enable this policy setting, users lose access to generative-AI video creation features in Video Creator and M365 apps.\n\nIf you disable or do not configure this policy setting, users retain access to generative-AI video creation features in Video Creator and M365 apps.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["CopilotBlockVideoGeneration","Privacy","Cloud Policies Boolean","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"CopilotBlockVideoGeneration","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CopilotChatSidePane","uniqueId":5328,"displayName":"Allow access to Copilot Chat in Microsoft 365 apps","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Copilot Chat is available to users in the Microsoft 365 apps and associated entry points (including the Copilot button located on the app's Home ribbon).\n\nIf you enable or don't configure this policy setting, users will be able to access Copilot Chat from within Microsoft 365 apps.\n\nIf you disable this policy setting, users won't be able to access entry points and Copilot Chat.\n\nNote: This policy doesn't apply to paid Copilot subscribers.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["CopilotChatSidePane","Cloud Policies Boolean","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"CopilotChatSidePane","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CopilotComplianceGuidance","uniqueId":5329,"displayName":"Configure Copilot Compliance guidance","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_CopilotComplianceGuidance;L_CopilotComplianceGuidanceOptions","logicalOperator":"exists","values":[]}],"logicalOperator":1}}]},"dataType":"Composite"},"description":"This policy setting controls whether Copilot provides compliance coaching to users based on your organization’s compliance policies.\n\nIf you enable this policy setting, you can configure links to organizational compliance policy documents so Copilot can use these documents to coach users on relevant compliance expectations while they create or refine content using Copilot experiences. Copilot provides contextual, assistive compliance coaching in supported experiences such as Outlook email drafting and Copilot Chat. For example, when users draft emails in Outlook, Copilot can coach and strengthen the email content by applying guidance from configured compliance policies. In Copilot Chat, users can receive compliance‑aware coaching while refining or improving content. This coaching is informational and guidance‑based, and helps users understand and align with organizational compliance policies as they work.\n\nAdministrators can configure up to 15 compliance policy links. If more than 15 policies are configured, Compliance Coaching uses only the first 15 policies added. The quality and relevance of the coaching depends on the content of the linked policy documents.\n\nSupported policy document formats include PDF and Microsoft Word documents that are text‑based and readable. Scanned PDFs are not supported.\n\nAll configured policy links must be valid, accessible, and available to all users in the organization so that users can view the referenced policies when needed.\n\nIf you disable or don't configure this policy setting, Copilot does not provide compliance coaching based on organizational policies. Users continue to receive existing Copilot and Outlook coaching capabilities without additional organizational compliance‑specific guidance.\n\nNote: Ensure that all configured policy links are current, accurate, text‑based, and accessible to all users, as broken links, restricted access, or unsupported document formats may limit the effectiveness of compliance coaching.\n\nNote: Compliance Coaching surfaces guidance only when Microsoft 365 Apps for enterprise and supported Copilot features, including Copilot Chat, are available and enabled.\n\nThis policy setting applies to subscription versions of Microsoft 365 Apps for enterprise and supported Copilot experiences.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["CopilotComplianceGuidance","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_CopilotComplianceGuidance;L_CopilotComplianceGuidanceOptions","uniqueId":5330,"displayName":"List of compliance documents:","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"This policy setting controls whether Copilot provides compliance coaching to users based on your organization’s compliance policies.\n\nIf you enable this policy setting, you can configure links to organizational compliance policy documents so Copilot can use these documents to coach users on relevant compliance expectations while they create or refine content using Copilot experiences. Copilot provides contextual, assistive compliance coaching in supported experiences such as Outlook email drafting and Copilot Chat. For example, when users draft emails in Outlook, Copilot can coach and strengthen the email content by applying guidance from configured compliance policies. In Copilot Chat, users can receive compliance‑aware coaching while refining or improving content. This coaching is informational and guidance‑based, and helps users understand and align with organizational compliance policies as they work.\n\nAdministrators can configure up to 15 compliance policy links. If more than 15 policies are configured, Compliance Coaching uses only the first 15 policies added. The quality and relevance of the coaching depends on the content of the linked policy documents.\n\nSupported policy document formats include PDF and Microsoft Word documents that are text‑based and readable. Scanned PDFs are not supported.\n\nAll configured policy links must be valid, accessible, and available to all users in the organization so that users can view the referenced policies when needed.\n\nIf you disable or don't configure this policy setting, Copilot does not provide compliance coaching based on organizational policies. Users continue to receive existing Copilot and Outlook coaching capabilities without additional organizational compliance‑specific guidance.\n\nNote: Ensure that all configured policy links are current, accurate, text‑based, and accessible to all users, as broken links, restricted access, or unsupported document formats may limit the effectiveness of compliance coaching.\n\nNote: Compliance Coaching surfaces guidance only when Microsoft 365 Apps for enterprise and supported Copilot features, including Copilot Chat, are available and enabled.\n\nThis policy setting applies to subscription versions of Microsoft 365 Apps for enterprise and supported Copilot experiences.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["CopilotComplianceGuidance","Cloud Policies Collection","Cloud Policies Composite","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilotcomplianceguidance","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_CopilotEngagedMode","uniqueId":5331,"displayName":"Enable Engaged Mode on Copilot Responsible AI","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether Engaged Mode is enabled for Copilot Responsible AI. Engaged Mode is designed to support legitimate use cases, particularly for law enforcement and other sensitive scenarios.\n\nIf you enable this policy setting, all Microsoft-imposed safety checks will be removed, and the customer will be responsible for ensuring safety and adherence to applicable regulations.\n\nIf you disable or do not configure this policy setting, Microsoft-imposed safety checks will remain enforced.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["CopilotEngagedMode","Cloud Policies Boolean","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"CopilotEngagedMode","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CopilotFileUpload;L_CopilotFileUploadOptions","uniqueId":5333,"displayName":"Options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow file uploads in both Microsoft 365 Copilot and Microsoft 365 Copilot Chat","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prevent file uploads in both Microsoft 365 Copilot and Microsoft 365 Copilot Chat","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable file uploads in Microsoft 365 Copilot Web mode and Microsoft 365 Copilot Chat while allowing them in Microsoft 365 Copilot Work mode","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to control whether users can upload files when using Microsoft 365 Copilot or Microsoft 365 Copilot Chat.\n\nIf you enable this policy setting, you can choose one of the following options for file uploads in Copilot:\n\n- Allow file uploads in both Microsoft 365 Copilot and Microsoft 365 Copilot Chat\n\n- Prevent file uploads in both Microsoft 365 Copilot and Microsoft 365 Copilot Chat\n\n- Disable file uploads in Microsoft 365 Copilot Web mode and Microsoft 365 Copilot Chat while allowing them in Microsoft 365 Copilot Work mode\n\nIf you don't configure this policy setting, users will be able to upload files in both Microsoft 365 Copilot and Microsoft 365 Copilot Chat.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["CopilotFileUpload","Cloud Policies Enum","Cloud Policies Composite","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"CopilotFileUpload","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CopilotFileUpload","uniqueId":5332,"displayName":"Allow file upload in Copilot","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_CopilotFileUpload;L_CopilotFileUploadOptions","logicalOperator":"exists","values":[]}],"logicalOperator":1}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to control whether users can upload files when using Microsoft 365 Copilot or Microsoft 365 Copilot Chat.\n\nIf you enable this policy setting, you can choose one of the following options for file uploads in Copilot:\n\n- Allow file uploads in both Microsoft 365 Copilot and Microsoft 365 Copilot Chat\n\n- Prevent file uploads in both Microsoft 365 Copilot and Microsoft 365 Copilot Chat\n\n- Disable file uploads in Microsoft 365 Copilot Web mode and Microsoft 365 Copilot Chat while allowing them in Microsoft 365 Copilot Work mode\n\nIf you don't configure this policy setting, users will be able to upload files in both Microsoft 365 Copilot and Microsoft 365 Copilot Chat.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["CopilotFileUpload","Cloud Policies Boolean","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_CopilotFrontier","uniqueId":5334,"displayName":"Allow users to access Frontier features","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy setting allows you to control whether users in your organization can access Frontier program features in the web version of the Microsoft 365 apps.\n\nThe Frontier program gives early adopters exclusive access to experimental AI features.\n\nNote: Features released through the Frontier program are experimental in nature. Microsoft does not provide support for these features, nor does it guarantee that they will ever be released through production channels. Microsoft reserves the right to remove features from Frontier at any time.\n\nIf you enable this policy setting, the Frontier program will be available for the users in their Microsoft 365 web apps.\n\nIf you disable this policy setting, the Frontier program will not be available for any users in their Microsoft 365 web apps.\n\nIf you don't configure this policy, the Frontier program will not be available for any users in their Microsoft 365 web apps.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["Cloud Policies Boolean","CopilotFrontier","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"CopilotFrontier","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CopilotLimitedMode","uniqueId":5335,"displayName":"Copilot Sentiment Response Control","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy controls whether Copilot users can receive responses to sentiment-related prompts.\n\nIf you enable this policy setting, Copilot will respond to sentiment-related prompts and questions asked by the user.\n\nIf you disable this policy setting, Copilot will not respond to sentiment-related prompts and questions asked by the user.\n\nIf you do not set this policy setting, Copilot will respond to sentiment-related prompts and questions asked by the user.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["Cloud Policies Boolean","CopilotLimitedMode","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"CopilotLimitedMode","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CopilotNotebooksLiveCapture","uniqueId":5336,"displayName":"Allow Live Capture in Copilot Notebooks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_CopilotNotebooksLiveCapture;L_CopilotNotebooksLiveCaptureOptions","logicalOperator":"exists","values":[]}],"logicalOperator":1}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This Policy controls whether users in your organization can use Live Capture in Copilot Notebooks to transcribe and generate notes from meetings and conversations using voice, images, and typed notes.\n\nAdmins can enable or disable Live Capture independently for Desktop and Mobile devices to align with organizational data governance, privacy, and compliance requirements.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["CopilotNotebooksLiveCapture","Copilot","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_CopilotNotebooksLiveCapture;L_CopilotNotebooksLiveCaptureOptions","uniqueId":5337,"displayName":"Options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Live Capture is available on both desktop and mobile","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Live Capture is not available anywhere","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Live Capture enabled on Mobile, but not on Desktop","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Live Capture enabled on Desktop, but not on Mobile","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This Policy controls whether users in your organization can use Live Capture in Copilot Notebooks to transcribe and generate notes from meetings and conversations using voice, images, and typed notes.\n\nAdmins can enable or disable Live Capture independently for Desktop and Mobile devices to align with organizational data governance, privacy, and compliance requirements.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["CopilotNotebooksLiveCapture","Cloud Policies Enum","Cloud Policies Composite","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"CopilotNotebooksLiveCapture","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CopilotPinning","uniqueId":5338,"displayName":"Pin Microsoft 365 Copilot Chat","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy setting allows you to control whether Microsoft 365 Copilot Chat is pinned to the navigation bar in Microsoft 365 apps. Pinning Copilot Chat ensures users have secure and consistent access to its generative AI capabilities while maintaining compliance within your organization.\n\nCopilot Chat used with EntraID is governed by your agreement for Online Services.\n\nIf you enable this policy setting, Copilot Chat will be pinned to the navigation bar in Microsoft 365 apps.\n\nIf you disable this policy setting, Copilot Chat will not be pinned to the navigation bar in Microsoft 365 apps.\n\nIf you don't configure this policy setting, Copilot Chat will be pinned by default to the navigation bar in Microsoft 365 apps. Copilot Chat will be pinned by default for all regions, except the European Economic Area (EEA) and Switzerland, starting May 1, 2025. For tenants whose primary location is in the EEA or Switzerland, as of July 15, 2025 this setting no longer governs the Microsoft 365 Copilot app but can still be used to control pinning within Microsoft 365 apps.\n\nAs of January 20, 2026 this setting no longer governs the Microsoft 365 Copilot app but can still be used to control pinning within Microsoft 365 apps.\n\nFor more information, see the following articles:\n\nHelp users get started and be more productive with the Copilot Chat and agent starter kit\n\nhttps://adoption.microsoft.com/copilot/chat-and-agent-starter-kit\n\nLearn more about this setting\n\nhttps://learn.microsoft.com/copilot/manage\n","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["Microsoft Office 2016","Cloud Policies Boolean","CopilotPinning","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"CopilotPinning","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CopilotWebSearch","uniqueId":5339,"displayName":"Allow web search in Copilot","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_CopilotWebSearch;L_CopilotWebSearchOptions","logicalOperator":"exists","values":[]}],"logicalOperator":1}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls web search availability when using Microsoft 365 Copilot or Microsoft 365 Copilot Chat.\n\nWeb search data is handled under Bing consumer terms, which are separate from Microsoft 365 data handling and processing terms.\n\nIf you enable this policy setting, you have three options for web search in Copilot:\n- Enabled in Microsoft 365 Copilot and Microsoft 365 Copilot Chat\n- Disabled in Microsoft 365 Copilot and Microsoft 365 Copilot Chat\n- Disabled in Microsoft 365 Copilot Work mode; Enabled in Microsoft 365 Copilot Web mode and Microsoft 365 Copilot Chat\n\nIf you choose \"Enabled in Microsoft 365 Copilot and Microsoft 365 Copilot Chat\", web search will be available to your users.\n\nIf you choose \"Disabled in Microsoft 365 Copilot and Microsoft 365 Copilot Chat\", web search won't be available to your users.\n\nIf you choose \"Disabled in Microsoft 365 Copilot Work mode; Enabled in Microsoft 365 Copilot Web mode and Microsoft 365 Copilot Chat\", web search will only be available to your users in Microsoft 365 Copilot Web mode and Microsoft 365 Copilot Chat. Your users won't be able to access web search in Microsoft 365 Copilot Work mode.\n\nNote: If you choose to make web search available to your users in Microsoft 365 Copilot, your users will still have the option to turn it off by disabling the web plugin toggle in Microsoft 365 Copilot. If some of the users in the selected scope don't have access to Microsoft 365 Copilot, your setting selection will apply only to Microsoft 365 Copilot Chat for those users.\n\nIf you don't configure this policy setting, web search will be available to your users in both Microsoft 365 Copilot and Microsoft 365 Copilot Chat, unless you have disabled access to optional connected experiences. Refer to the \"Allow the use of additional optional connected experiences in Office\" policy for more information and to confirm your settings. (Note for GCC customers: Web search will be off by default when the policy is not configured, regardless of the setting of the optional connected experiences policy.)\n\nYou can choose to turn on web search independently of the optional connected experiences policy. When web search is turned on, web search data will be handled under Bing consumer data handling terms.\n\nThe Bing search service operates separately from Microsoft 365 and has different data-handling practices. The use of Bing is covered by the Microsoft Services Agreement ( https://www.microsoft.com/servicesagreement ), together with the Microsoft Privacy Statement ( https://www.microsoft.com/privacy/privacystatement ). The Microsoft Products and Services Data Protection Addendum (DPA) ( https://www.microsoft.com/licensing/docs/view/Microsoft-Products-and-Services-Data-Protection-Addendum-DPA ) doesn't apply to the use of web content plugin in Microsoft 365 Copilot, Microsoft 365 Copilot Chat, or the Bing search service.\n\nFor more information, see Data, privacy, and security for web queries in Microsoft 365 Copilot and Microsoft 365 Copilot Chat ( https://go.microsoft.com/fwlink/p/?linkid=2289443 ) and Manage Microsoft 365 Copilot Chat ( https://go.microsoft.com/fwlink/p/?linkid=2290003 ).\n\n","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["CopilotWebSearch","Privacy","Copilot","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_CopilotWebSearch;L_CopilotWebSearchOptions","uniqueId":5340,"displayName":"Options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled in Microsoft 365 Copilot and Microsoft 365 Copilot Chat","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled in Microsoft 365 Copilot and Microsoft 365 Copilot Chat","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled in Microsoft 365 Copilot Work mode, Enabled in Microsoft 365 Copilot Web mode and Microsoft 365 Copilot Chat","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls web search availability when using Microsoft 365 Copilot or Microsoft 365 Copilot Chat.\n\nWeb search data is handled under Bing consumer terms, which are separate from Microsoft 365 data handling and processing terms.\n\nIf you enable this policy setting, you have three options for web search in Copilot:\n- Enabled in Microsoft 365 Copilot and Microsoft 365 Copilot Chat\n- Disabled in Microsoft 365 Copilot and Microsoft 365 Copilot Chat\n- Disabled in Microsoft 365 Copilot Work mode; Enabled in Microsoft 365 Copilot Web mode and Microsoft 365 Copilot Chat\n\nIf you choose \"Enabled in Microsoft 365 Copilot and Microsoft 365 Copilot Chat\", web search will be available to your users.\n\nIf you choose \"Disabled in Microsoft 365 Copilot and Microsoft 365 Copilot Chat\", web search won't be available to your users.\n\nIf you choose \"Disabled in Microsoft 365 Copilot Work mode; Enabled in Microsoft 365 Copilot Web mode and Microsoft 365 Copilot Chat\", web search will only be available to your users in Microsoft 365 Copilot Web mode and Microsoft 365 Copilot Chat. Your users won't be able to access web search in Microsoft 365 Copilot Work mode.\n\nNote: If you choose to make web search available to your users in Microsoft 365 Copilot, your users will still have the option to turn it off by disabling the web plugin toggle in Microsoft 365 Copilot. If some of the users in the selected scope don't have access to Microsoft 365 Copilot, your setting selection will apply only to Microsoft 365 Copilot Chat for those users.\n\nIf you don't configure this policy setting, web search will be available to your users in both Microsoft 365 Copilot and Microsoft 365 Copilot Chat, unless you have disabled access to optional connected experiences. Refer to the \"Allow the use of additional optional connected experiences in Office\" policy for more information and to confirm your settings. (Note for GCC customers: Web search will be off by default when the policy is not configured, regardless of the setting of the optional connected experiences policy.)\n\nYou can choose to turn on web search independently of the optional connected experiences policy. When web search is turned on, web search data will be handled under Bing consumer data handling terms.\n\nThe Bing search service operates separately from Microsoft 365 and has different data-handling practices. The use of Bing is covered by the Microsoft Services Agreement ( https://www.microsoft.com/servicesagreement ), together with the Microsoft Privacy Statement ( https://www.microsoft.com/privacy/privacystatement ). The Microsoft Products and Services Data Protection Addendum (DPA) ( https://www.microsoft.com/licensing/docs/view/Microsoft-Products-and-Services-Data-Protection-Addendum-DPA ) doesn't apply to the use of web content plugin in Microsoft 365 Copilot, Microsoft 365 Copilot Chat, or the Bing search service.\n\nFor more information, see Data, privacy, and security for web queries in Microsoft 365 Copilot and Microsoft 365 Copilot Chat ( https://go.microsoft.com/fwlink/p/?linkid=2289443 ) and Manage Microsoft 365 Copilot Chat ( https://go.microsoft.com/fwlink/p/?linkid=2290003 ).\n\n","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["CopilotWebSearch","Privacy","Cloud Policies Enum","Cloud Policies Composite","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"CopilotWebSearch","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CopilotZeroQueryLogging","uniqueId":5341,"displayName":"Enable Zero Query Logging for Copilot web searches","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls whether users are subject to Zero Query Logging in Bing when performing web searches through Microsoft 365 Copilot or Copilot Chat.\n\nIf you enable this policy setting, user's web searches in Copilot will use Bing with Zero Query Logging.\n\nIf you disable or don't configure this policy setting, users will use the standard Bing search service.\n\nNote: This policy controls which Bing search service is used for users or groups subject to this policy. To turn web search on or off for Copilot, continue to use the 'Allow web search in Copilot' policy.\n\nAll protections described in this documentation apply to both the standard Bing service and Zero Query Logging.\n\nFor more information, see https://learn.microsoft.com/en-us/copilot/microsoft-365/manage-public-web-access#how-microsoft-handles-generated-queries and https://learn.microsoft.com/en-us/microsoft-365/copilot/microsoft-365-copilot-zero-query-logging ","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["CopilotZeroQueryLogging","Cloud Policies Boolean","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"CopilotZeroQueryLogging","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CorrectaccidentaluseofcAPSLOCKkey","uniqueId":1653,"displayName":"Correct accidental use of cAPS LOCK key","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Tools | AutoCorrect Options... (Excel, PowerPoint and Access)","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\autocorrect","registrySubPath":"togglecapslock","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CorrectTWoINitialCApitals","uniqueId":1650,"displayName":"Correct TWo INitial CApitals","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Tools | AutoCorrect Options... (Excel, PowerPoint and Access)","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\autocorrect","registrySubPath":"correcttwoinitialcapitals","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Corsican","uniqueId":2086,"displayName":"Corsican","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Corsican","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"co-fr","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CroatianBosniaandHerzegovina","uniqueId":2087,"displayName":"Croatian (Bosnia and Herzegovina)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Croatian (Bosnia and Herzegovina)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"hr-ba","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_CroatianCroatia","uniqueId":2088,"displayName":"Croatian (Croatia)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Croatian (Croatia)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"hr-hr","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Czech","uniqueId":2089,"displayName":"Czech","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Czech","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"cs-cz","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Danish","uniqueId":2090,"displayName":"Danish","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Danish","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"da-dk","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Dari","uniqueId":2091,"displayName":"Dari","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Dari","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"prs-af","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DatabaseDefaultInstancesLimit","uniqueId":2581,"displayName":"Set the database default instances limit","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_DatabaseDefaultInstancesLimit;L_DatabaseDefaultInstancesLimitDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the default limit of how many instances per page the database shim can return.  The application is allowed to specify a larger timeout programmatically.  This is a default value to be used by the database shim to restrict the number of results that can be returned per page. The application can specify a larger limit via execution context.\n\nIf you enable this policy setting, you may specify the default limit of how many instances the database shim can return.\n\nIf you disable or do not configure this policy setting, a default value of 200 instances per page will be used.","supportedPlatforms":["Windows"],"tags":["Database","Business Data","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_DatabaseDefaultInstancesLimit;L_DatabaseDefaultInstancesLimitDecimal","uniqueId":2580,"displayName":"Default number of instances returned","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":2000000},"dataType":"Integer"},"description":"This policy setting allows you to specify the default limit of how many instances per page the database shim can return.  The application is allowed to specify a larger timeout programmatically.  This is a default value to be used by the database shim to restrict the number of results that can be returned per page. The application can specify a larger limit via execution context.\n\nIf you enable this policy setting, you may specify the default limit of how many instances the database shim can return.\n\nIf you disable or do not configure this policy setting, a default value of 200 instances per page will be used.","supportedPlatforms":["Windows"],"tags":["Database","Business Data","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\business data\\limits\\database\\items","registrySubPath":"default","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DatabaseDefaultTimeout","uniqueId":2585,"displayName":"Set the database default timeout","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_DatabaseDefaultTimeout;L_DatabaseDefaultTimeoutDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the default timeout in milliseconds used by the database shim.  The application can specify a larger limit via the execution context.\n    \nIf you enable this policy setting, you may specify the default timeout in milliseconds used by the database shim.\n\nIf you disable or do not configure this policy setting, a default of 7000 milliseconds will be used.","supportedPlatforms":["Windows"],"tags":["Database","Business Data","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_DatabaseDefaultTimeout;L_DatabaseDefaultTimeoutDecimal","uniqueId":2584,"displayName":"Database default timeout (milliseconds)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":75000000},"dataType":"Integer"},"description":"This policy setting allows you to specify the default timeout in milliseconds used by the database shim.  The application can specify a larger limit via the execution context.\n    \nIf you enable this policy setting, you may specify the default timeout in milliseconds used by the database shim.\n\nIf you disable or do not configure this policy setting, a default of 7000 milliseconds will be used.","supportedPlatforms":["Windows"],"tags":["Database","Business Data","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\business data\\limits\\database\\timeout","registrySubPath":"default","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DatabaseMaxInstancesLimit","uniqueId":2583,"displayName":"Set maximum database instances limit","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_DatabaseMaxInstancesLimit;L_DatabaseMaxInstancesLimitDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the maximum limit of how many instances per page the database shim can return.  This policy setting enforces the allowed maximum for applications including those that do not respect the default.\n \nIf you enable this policy setting, you may specify the maximum limit of how many instances the database shim can return.\n\nIf you disable or do not configure this policy setting, there will be no limit of how many instances the database shim can return.","supportedPlatforms":["Windows"],"tags":["Database","Business Data","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_DatabaseMaxInstancesLimit;L_DatabaseMaxInstancesLimitDecimal","uniqueId":2582,"displayName":"Maximum number of instances returned","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":2000000},"dataType":"Integer"},"description":"This policy setting allows you to specify the maximum limit of how many instances per page the database shim can return.  This policy setting enforces the allowed maximum for applications including those that do not respect the default.\n \nIf you enable this policy setting, you may specify the maximum limit of how many instances the database shim can return.\n\nIf you disable or do not configure this policy setting, there will be no limit of how many instances the database shim can return.","supportedPlatforms":["Windows"],"tags":["Database","Business Data","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\business data\\limits\\database\\items","registrySubPath":"max","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DatabaseMaxTimeout","uniqueId":2587,"displayName":"Set maximum database timeout limit","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_DatabaseMaxTimeout;L_DatabaseMaxTimeoutDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the maximum timeout in milliseconds used by the database shim.  This maximum value is enforced for applications including those that do not respect the default.\n\nIf you enable this policy setting, you may specify the maximum timeout in milliseconds used by the database shim.\n\nIf you disable or do not configure this policy setting, no maximum timeout value will be enforced.","supportedPlatforms":["Windows"],"tags":["Database","Business Data","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_DatabaseMaxTimeout;L_DatabaseMaxTimeoutDecimal","uniqueId":2586,"displayName":"Database maximum timeout (milliseconds)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":75000000},"dataType":"Integer"},"description":"This policy setting allows you to specify the maximum timeout in milliseconds used by the database shim.  This maximum value is enforced for applications including those that do not respect the default.\n\nIf you enable this policy setting, you may specify the maximum timeout in milliseconds used by the database shim.\n\nIf you disable or do not configure this policy setting, no maximum timeout value will be enforced.","supportedPlatforms":["Windows"],"tags":["Database","Business Data","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\business data\\limits\\database\\timeout","registrySubPath":"max","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Defaultbuttontext","uniqueId":2300,"displayName":"Default button text","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Defaultbuttontext;L_defaultbuttontext350","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the custom button text that appears on the error dialog box.","supportedPlatforms":["Windows"],"tags":["Customizable Error Messages","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Defaultbuttontext;L_defaultbuttontext350","uniqueId":2299,"displayName":"Default button text","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Sets the custom button text that appears on the error dialog box.","supportedPlatforms":["Windows"],"tags":["Customizable Error Messages","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"customizablealertdefaultbuttontext","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_DefaultFileShareCatalog","uniqueId":1835,"displayName":"Default Shared Folder Location","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_DefaultFileShareCatalog;L_URL","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to set the location of the Shared Folder Catalog that is designated as Default. The web add-ins contained in the Default Catalog can be inserted into Office documents by users. If the policy setting that allows users to control the Trusted Shared Folder Catalogs is enabled, this setting will be ignored.\n\nIf you enable this policy setting and do not enable the policy setting that allows users to control the Trusted Shared Folder Catalogs, you can set the URL for the Shared Folder from which users can insert web add-ins into their Office documents.\n\nIf you disable this policy setting and do not enable the policy setting that allows users to control the Trusted Shared Folder Catalogs, users cannot insert web add-ins from a Shared Folder.\n\nIf you do not configure this policy or any other policy settings in the Trusted Catalogs folder, users can set their own Default Shared Folder location.","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalogfsdefault","registrySubPath":"id","enforcedValues":{"enabled":"catalogFSDefault"}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalogfsdefault","registrySubPath":"flags","enforcedValues":{"enabled":1}}]}}},{"id":"office16;L_DefaultFileShareCatalog;L_URL","uniqueId":1834,"displayName":"URL: ","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to set the location of the Shared Folder Catalog that is designated as Default. The web add-ins contained in the Default Catalog can be inserted into Office documents by users. If the policy setting that allows users to control the Trusted Shared Folder Catalogs is enabled, this setting will be ignored.\n\nIf you enable this policy setting and do not enable the policy setting that allows users to control the Trusted Shared Folder Catalogs, you can set the URL for the Shared Folder from which users can insert web add-ins into their Office documents.\n\nIf you disable this policy setting and do not enable the policy setting that allows users to control the Trusted Shared Folder Catalogs, users cannot insert web add-ins from a Shared Folder.\n\nIf you do not configure this policy or any other policy settings in the Trusted Catalogs folder, users can set their own Default Shared Folder location.","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalogfsdefault","registrySubPath":"url","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_DefaultformatforPublish","uniqueId":2466,"displayName":"Default format for 'Publish'","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_DefaultformatforPublish;L_defaultformatforpublish405","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\"Web Archive (*.mht)\": The Publish command creates a Web Archive file. | \"Web Page (*.htm)\": The Publish command creates an HTML file. | \"Default\": The Publish command uses the default Web page format for publishing.","supportedPlatforms":["Windows"],"tags":["Web Archives","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_DefaultformatforPublish;L_defaultformatforpublish405","uniqueId":2465,"displayName":"Default format for 'Publish'","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Web Archive (*.mht)","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Web Page (*.htm)","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Default","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":2,"description":"\"Web Archive (*.mht)\": The Publish command creates a Web Archive file. | \"Web Page (*.htm)\": The Publish command creates an HTML file. | \"Default\": The Publish command uses the default Web page format for publishing.","supportedPlatforms":["Windows"],"tags":["Web Archives","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"publishformat","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Defaultorspecificencoding;L_AlwayssaveWebpagesinthedefaultencoding","uniqueId":1669,"displayName":"Always save Web pages in the default encoding.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"When enabled, either default encoding or a specified encoding will be used.","supportedPlatforms":["Windows"],"tags":["Encoding","Tools | Options | General | Web Options...","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"alwayssaveindefaultencoding","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Defaultorspecificencoding","uniqueId":1671,"displayName":"Default or specific encoding","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Defaultorspecificencoding;L_AlwayssaveWebpagesinthedefaultencoding","logicalOperator":"exists","values":null},{"dependee":"office16;L_Defaultorspecificencoding;L_Savethisdocumentas","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"When enabled, either default encoding or a specified encoding will be used.","supportedPlatforms":["Windows"],"tags":["Encoding","Tools | Options | General | Web Options...","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Defaultorspecificencoding;L_Savethisdocumentas","uniqueId":1670,"displayName":"Save this document as","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1256,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic Alphabet (Windows)","description":"","tags":[],"dependencyGroup":null},{"value":28594,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Baltic Alphabet (ISO)","description":"","tags":[],"dependencyGroup":null},{"value":1257,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Baltic Alphabet (Windows)","description":"","tags":[],"dependencyGroup":null},{"value":852,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Central European (DOS)","description":"","tags":[],"dependencyGroup":null},{"value":28592,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Central European Alphabet (ISO)","description":"","tags":[],"dependencyGroup":null},{"value":1250,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Central European Alphabet (Windows)","description":"","tags":[],"dependencyGroup":null},{"value":936,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Chinese Simplified (GB2312)","description":"","tags":[],"dependencyGroup":null},{"value":52936,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Chinese Simplified (HZ)","description":"","tags":[],"dependencyGroup":null},{"value":950,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Chinese Traditional (Big 5)","description":"","tags":[],"dependencyGroup":null},{"value":866,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cyrillic Alphabet (DOS)","description":"","tags":[],"dependencyGroup":null},{"value":28595,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cyrillic Alphabet (ISO)","description":"","tags":[],"dependencyGroup":null},{"value":20866,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cyrillic Alphabet (KOI8-R)","description":"","tags":[],"dependencyGroup":null},{"value":1251,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cyrillic Alphabet (Windows)","description":"","tags":[],"dependencyGroup":null},{"value":28597,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Greek Alphabet (ISO)","description":"","tags":[],"dependencyGroup":null},{"value":1253,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Greek Alphabet (Windows)","description":"","tags":[],"dependencyGroup":null},{"value":1255,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hebrew Alphabet (Windows)","description":"","tags":[],"dependencyGroup":null},{"value":51932,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Japanese (EUC)","description":"","tags":[],"dependencyGroup":null},{"value":50220,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Japanese (JIS)","description":"","tags":[],"dependencyGroup":null},{"value":50222,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Japanese (JIS-Allow 1 byte Kana - SO/SI)","description":"","tags":[],"dependencyGroup":null},{"value":50221,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Japanese (JIS-Allow 1 byte Kana)","description":"","tags":[],"dependencyGroup":null},{"value":932,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Japanese (Shift-JIS)","description":"","tags":[],"dependencyGroup":null},{"value":949,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Korean","description":"","tags":[],"dependencyGroup":null},{"value":28593,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Latin 3 Alphabet (ISO)","description":"","tags":[],"dependencyGroup":null},{"value":874,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Thai (Windows)","description":"","tags":[],"dependencyGroup":null},{"value":1254,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Turkish Alphabet","description":"","tags":[],"dependencyGroup":null},{"value":21866,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Ukrainian Alphabet (KOI8-RU)","description":"","tags":[],"dependencyGroup":null},{"value":1200,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Universal Alphabet","description":"","tags":[],"dependencyGroup":null},{"value":1201,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Universal Alphabet (Big-Endian)","description":"","tags":[],"dependencyGroup":null},{"value":65001,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Universal Alphabet (UTF-8)","description":"","tags":[],"dependencyGroup":null},{"value":1258,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Vietnamese Alphabet (Windows)","description":"","tags":[],"dependencyGroup":null},{"value":28598,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Visual Hebrew (ISO)","description":"","tags":[],"dependencyGroup":null},{"value":1252,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Western Alphabet (Windows)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1256,"description":"When enabled, either default encoding or a specified encoding will be used.","supportedPlatforms":["Windows"],"tags":["Encoding","Tools | Options | General | Web Options...","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"encoding","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Defaultsaveprompttext","uniqueId":2304,"displayName":"Default save prompt text","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Defaultsaveprompttext;L_defaultsaveprompttext352","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the text displayed when the user saves a document in any format other than the default.","supportedPlatforms":["Windows"],"tags":["Customizable Error Messages","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Defaultsaveprompttext;L_defaultsaveprompttext352","uniqueId":2303,"displayName":"Default save prompt text","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Sets the text displayed when the user saves a document in any format other than the default.","supportedPlatforms":["Windows"],"tags":["Customizable Error Messages","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"saveprompttext","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_DefaultSPCatalog","uniqueId":1833,"displayName":"Default SharePoint Catalog Location","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_DefaultSPCatalog;L_URL","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to set the location of the SharePoint Catalog that is designated as Default. The web add-ins contained in the Default Catalog can be inserted into Office documents by users.\n\nIf you enable this policy setting, you can set the URL for the SharePoint Catalog from which users can insert apps into their Office documents.\n\nIf you disable this policy setting, users cannot insert web add-ins from a SharePoint catalog.\n\nIf you do not configure this policy setting or set any other policy settings in the Trusted Catalogs folder, users can set their own Default SharePoint Catalog location.","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalogspdefault","registrySubPath":"id","enforcedValues":{"enabled":"catalogSPDefault"}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalogspdefault","registrySubPath":"flags","enforcedValues":{"enabled":1}}]}}},{"id":"office16;L_DefaultSPCatalog;L_URL","uniqueId":1832,"displayName":"URL: ","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to set the location of the SharePoint Catalog that is designated as Default. The web add-ins contained in the Default Catalog can be inserted into Office documents by users.\n\nIf you enable this policy setting, you can set the URL for the SharePoint Catalog from which users can insert apps into their Office documents.\n\nIf you disable this policy setting, users cannot insert web add-ins from a SharePoint catalog.\n\nIf you do not configure this policy setting or set any other policy settings in the Trusted Catalogs folder, users can set their own Default SharePoint Catalog location.","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalogspdefault","registrySubPath":"url","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_Defaultsubjectforareviewrequest","uniqueId":2451,"displayName":"Default subject for a review request","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Defaultsubjectforareviewrequest;L_defaultsubjectforareviewrequest393","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines the default subject text for a review request.","supportedPlatforms":["Windows"],"tags":["Collaboration Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Defaultsubjectforareviewrequest;L_defaultsubjectforareviewrequest393","uniqueId":2450,"displayName":"Default subject for a review request","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Defines the default subject text for a review request.","supportedPlatforms":["Windows"],"tags":["Collaboration Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\reviewcycle","registrySubPath":"defaultsubject","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_DefaultUIThemeUser;L_defaultUIThemeEnum","uniqueId":2955,"displayName":"Theme:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Colorful","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Gray","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Black","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"White","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to select the user interface (UI) theme used by Office, if the user has not already selected an Office theme.\n\nNote: This setting only applies to Version 1903 or later of Office.\n\nIf you enable this policy setting, you may choose the Office theme used in cases where the user has not selected an Office theme themselves.\n\nIf you disable or do not configure this policy setting, Office will use the Colorful theme in cases where the user has not selected an Office theme themselves.\n\nRegardless of how you configure this policy setting, users can change their Office theme by going to File > Account > Office Theme (or, in Outlook, by going to File > Office Account > Office Theme).\n\nNote: The “Default Office theme” policy setting located under Computer Configuration takes precedence over this policy setting.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"default ui theme","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DefaultUIThemeUser","uniqueId":2956,"displayName":"Default Office theme","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_DefaultUIThemeUser;L_defaultUIThemeEnum","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to select the user interface (UI) theme used by Office, if the user has not already selected an Office theme.\n\nNote: This setting only applies to Version 1903 or later of Office.\n\nIf you enable this policy setting, you may choose the Office theme used in cases where the user has not selected an Office theme themselves.\n\nIf you disable or do not configure this policy setting, Office will use the Colorful theme in cases where the user has not selected an Office theme themselves.\n\nRegardless of how you configure this policy setting, users can change their Office theme by going to File > Account > Office Theme (or, in Outlook, by going to File > Office Account > Office Theme).\n\nNote: The “Default Office theme” policy setting located under Computer Configuration takes precedence over this policy setting.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_DeleteFilesFromOfficeDocumentCache","uniqueId":2529,"displayName":"Delete files from Office Document Cache","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether or not documents opened in Office are deleted from the Office Document Cache when they are closed.\n\nIf you enable this policy setting documents are deleted from the Office Document Cache when they are closed. \n\nIf you disable or do not configure this policy setting, documents are not deleted from the Office Document Cache when they are closed.\n\nNote: This policy setting does not apply to documents in SharePoint Workspace. Documents in SharePoint Workspace will not be deleted from the Office Document cache when they are closed. Sharepoint Workspace will not work correctly if this Group Policy is enabled.","supportedPlatforms":["Windows"],"tags":["Microsoft Office Document Cache","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\fileio","registrySubPath":"disablelongtermcaching","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DesignerImageGeneration","uniqueId":5342,"displayName":"Control access to Designer Image Generation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control access to Designer Image Generation in AppChat, BizChat, Copilot Visual Creator, and Compliant Web Copilot across the entire tenant.\n\nIf you enable this policy setting, the tenant loses access to Designer Image Generation in AppChat, BizChat, Copilot Visual Creator, and Compliant Web Copilot.\n\nIf you disable this policy setting, the tenant retains access to Designer Image Generation in AppChat, BizChat, Copilot Visual Creator, and Compliant Web Copilot.\n\nIf you don't configure this policy setting, the tenant retains access to Designer Image Generation in AppChat, BizChat, Copilot Visual Creator, and Compliant Web Copilot.","supportedPlatforms":["Windows","Mac","iOS","Web"],"tags":["DesignerImageGeneration","Copilot","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\designer","registrySubPath":"DesignerImageGeneration","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DesignerPrivacyLink","uniqueId":5343,"displayName":"Enable tenant admin to add customized privacy link to user consent dialog","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_DesignerPrivacyLink;L_DesignerPrivacyLink1","logicalOperator":"exists","values":[]}],"logicalOperator":1}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to enable tenant administrators to add and customize their tenant's own privacy policy as a link in the Designer's Restyle Image feature.\n\nIf you enable this policy setting, tenant administrators can add and customize their tenant's privacy policy as a link in the Designer's Restyle Image feature.\n\nIf you disable this policy setting, tenant administrators will be unable to add or customize their tenant's privacy policy as a link in the Designer's Restyle Image feature.\n\nIf you do not configure this policy setting, tenant administrators will be unable to add or customize their tenant's privacy policy as a link in the Designer's Restyle Image feature.","supportedPlatforms":["iOS","Android","Web"],"tags":["DesignerPrivacyLink","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_DesignerPrivacyLink;L_DesignerPrivacyLink1","uniqueId":5344,"displayName":"Privacy policy link:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting enables tenant admin to add and customize their tenant's own privacy policy as a link in the Designer's Restyle Image feature.","supportedPlatforms":["iOS","Android","Web"],"tags":["Cloud Policies Text","Cloud Policies Composite","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\designer","registrySubPath":"DesignerPrivacyLink","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_DesignerRestyleOptOut","uniqueId":5345,"displayName":"Allow tenant to opt-out of Designer's Restyle image experience","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy setting allows you to control whether the tenant can use the Designer's Restyle Image feature.\n\nIf you enable this policy setting, the tenant will be able to opt-out of using the Designer's Restyle Image feature.\n\nIf you disable this policy setting, the tenant will be required to use the Designer's Restyle Image feature.\n\nIf you do not configure this policy setting, the tenant will be required to use the Designer's Restyle Image feature.","supportedPlatforms":["iOS","Android","Web"],"tags":["Cloud Policies Boolean","DesignerRestyleOptOut","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\designer","registrySubPath":"DesignerRestyleOptOut","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableAllActiveX","uniqueId":2016,"displayName":"Disable All ActiveX","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether ActiveX controls are disabled. \n\nIf you enable this policy setting, Office 2016 applications do not initialize ActiveX controls from non-trusted locations, and do not notify the user that the ActiveX controls are disabled. \n\nIf you disable or do not configure this policy setting, users can set the trust level for ActiveX controls in the Trust Center in the 2016 versions of Microsoft Access, PowerPoint, Word, and Excel. The default configuration does not load untrusted ActiveX controls, but uses the Message Bar to prompt users about the control, and they can then choose whether to run the control.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\security","registrySubPath":"disableallactivex","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableAllCatalogs","uniqueId":1829,"displayName":"Block Web Add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to prevent users from using web add-ins.\n\nIf you enable this policy setting, web add-ins are blocked and all other policy settings in the Trusted Catalogs folder are ignored.\n\nIf you disable or do not configure this policy setting, apps are allowed. Other policy settings in the Trusted Catalogs folder determine which specific app sources are allowed.","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs","registrySubPath":"disableallcatalogs","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableallTrustBarnotificationsfor","uniqueId":1768,"displayName":"Disable all Trust Bar notifications for security issues","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting controls whether Office 2016 applications notify users when potentially unsafe features or content are detected, or whether such features or content are silently disabled without notification. \n\nThe Message Bar in Office 2016 applications is used to identify security issues, such as unsigned macros or potentially unsafe add-ins. When such issues are detected, the application disables the unsafe feature or content and displays the Message Bar at the top of the active window. The Message Bar informs the users about the nature of the security issue and, in some cases, provides the users with an option to enable the potentially unsafe feature or content, which could harm the user's computer. \n\nIf you enable this policy setting, Office 2016 applications do not display information in the Message Bar about potentially unsafe content that has been detected or has automatically been blocked. \n\nIf you disable this policy setting, Office 2016 applications display information in the Message Bar about content that has automatically been blocked. \n\nIf you do not configure this policy setting, if an Office 2016 application detects a security issue, the Message Bar is displayed. However, this configuration can be modified by users in the Trust Center.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\trustcenter","registrySubPath":"trustbar","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableAnimations","uniqueId":2871,"displayName":"Disable Office animations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This setting will disable all unnecessary Office animations.  By default, animation effects, such as fading between views, are enabled.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\graphics","registrySubPath":"disableanimations","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableBackgrounds","uniqueId":2889,"displayName":"Disable Office Backgrounds","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting turns on and off the ability of users to select an Office background.\n\nIf you enable this policy setting, users won’t see the Office Backgrounds setting in either the Account place or the Options dialog. They also won’t have an Office Background applied to the upper right of their Office applications.\n\nIf you disable or don’t configure this policy setting, users will see the Office Backgrounds setting in the Account place and in the Options dialog, and they will have an Office Background applied to the upper right of their Office applications.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"disablebackgrounds","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Disablebuiltincolorvariations","uniqueId":2523,"displayName":"Disable built-in color variations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Specify whether or not to show the built-in color variations.","supportedPlatforms":["Windows"],"tags":["Microsoft Office SmartArt","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\smartart graphics","registrySubPath":"hidebuiltindiagramcolors","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableBuiltinIGXGraphics","uniqueId":2516,"displayName":"Disable built-in graphics","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Specify whether or not to show the built-in SmartArt Graphics.","supportedPlatforms":["Windows"],"tags":["Microsoft Office SmartArt","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\smartart graphics","registrySubPath":"hidebuiltindiagrams","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisablebuiltinQuickStyles","uniqueId":2524,"displayName":"Disable Built-in Quick Styles","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Specify whether or not to show the built-in Quick Styles.","supportedPlatforms":["Windows"],"tags":["Microsoft Office SmartArt","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\smartart graphics","registrySubPath":"hidebuiltindiagramstyles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableClipboardToolbartriggers","uniqueId":2713,"displayName":"Disable Clipboard Toolbar triggers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checked: Prevents the Office Clipboard from automatically appearing when multiple Copy commands are performed in any of the Office programs. | Unchecked: Permits the Office Clipboard to appear automatically when multiple Copy commands are performed in Office programs.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"acbcontrol","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableComingSoon","uniqueId":2946,"displayName":"Turn off Coming Soon","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Coming Soon is available to users. Coming Soon provides information in an Office app, such as Word or Excel, about upcoming feature changes to that app and lets users try out those changes ahead of time. By default, Coming Soon is available to users.\n\nIf you enable this policy setting, Coming Soon is turned off and isn't available to users.\n\nIf you disable or don't configure this policy setting, Coming Soon is available to users.","supportedPlatforms":["Windows"],"tags":["Other","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"disablecomingsoon","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableContentSafetyGeneralUser","uniqueId":2985,"displayName":"Disable local content safety in general for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy setting disables local content safety in general for the user.\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is enabled, local content safety in general is disabled for the user.\n- If this policy setting is disabled, local content safety in general is enabled for the user.\n- If this policy setting is not configured, local content safety in general is enabled for the user.\n\nFor this policy setting, the order of priority is:\n1. Disable local content safety to and from [a specific scenario] for the computer.\n2. Disable local content safety in general for the computer.\n3. Disable local content safety to and from [a specific scenario] for the user.\n4. Disable local content safety in general for the user.","supportedPlatforms":["Windows"],"tags":["General","Content Safety","AI","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\general","registrySubPath":"disablecontentsafety","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableContentSafetySpecificAlternativeTextUser","uniqueId":3012,"displayName":"Disable local content safety to and from the Alternative Text scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy setting disables local content safety of the Alternative Text scenario for the user.\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is enabled, local content safety for the Alternative Text scenario is disabled for the user.\n- If this policy setting is disabled, local content safety for the Alternative Text scenario is enabled for the user.\n- If this policy setting is not configured, local content safety for the Alternative Text scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, local content safety for the Alternative Text scenario is enabled for the user.\n\nFor this policy setting, the order of priority is:\n1. Disable local content safety to and from the Alternative Text scenario for the computer.\n2. Disable local content safety in general for the computer.\n3. Disable local content safety to and from the Alternative Text scenario for the user.\n4. Disable local content safety in general for the user.","supportedPlatforms":["Windows"],"tags":["Alternative Text","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\alternativetext","registrySubPath":"disablecontentsafety","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableContentSafetySpecificImageQuestionAndAnsweringUser","uniqueId":3039,"displayName":"Disable local content safety to and from the Image Question and Answering scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy setting disables local content safety of the Image Question and Answering scenario for the user.\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is enabled, local content safety for the Image Question and Answering scenario is disabled for the user.\n- If this policy setting is disabled, local content safety for the Image Question and Answering scenario is enabled for the user.\n- If this policy setting is not configured, local content safety for the Image Question and Answering scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, local content safety for the Image Question and Answering scenario is enabled for the user.\n\nFor this policy setting, the order of priority is:\n1. Disable local content safety to and from the Image Question and Answering scenario for the computer.\n2. Disable local content safety in general for the computer.\n3. Disable local content safety to and from the Image Question and Answering scenario for the user.\n4. Disable local content safety in general for the user.","supportedPlatforms":["Windows"],"tags":["Image Question and Answering","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\imagequestionandanswering","registrySubPath":"disablecontentsafety","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableContentSafetySpecificPromptAssistanceUser","uniqueId":3003,"displayName":"Disable local content safety to and from the Prompt Assistance scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy setting disables local content safety of the Prompt Assistance scenario for the user.\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is enabled, local content safety for the Prompt Assistance scenario is disabled for the user.\n- If this policy setting is disabled, local content safety for the Prompt Assistance scenario is enabled for the user.\n- If this policy setting is not configured, local content safety for the Prompt Assistance scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, local content safety for the Prompt Assistance scenario is enabled for the user.\n\nFor this policy setting, the order of priority is:\n1. Disable local content safety to and from the Prompt Assistance scenario for the computer.\n2. Disable local content safety in general for the computer.\n3. Disable local content safety to and from the Prompt Assistance scenario for the user.\n4. Disable local content safety in general for the user.","supportedPlatforms":["Windows"],"tags":["Prompt Assistance","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\promptassistance","registrySubPath":"disablecontentsafety","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableContentSafetySpecificRewriteUser","uniqueId":2994,"displayName":"Disable local content safety to and from the Rewrite scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy setting disables local content safety of the Rewrite scenario for the user.\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is enabled, local content safety for the Rewrite scenario is disabled for the user.\n- If this policy setting is disabled, local content safety for the Rewrite scenario is enabled for the user.\n- If this policy setting is not configured, local content safety for the Rewrite scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, local content safety for the Rewrite scenario is enabled for the user.\n\nFor this policy setting, the order of priority is:\n1. Disable local content safety to and from the Rewrite scenario for the computer.\n2. Disable local content safety in general for the computer.\n3. Disable local content safety to and from the Rewrite scenario for the user.\n4. Disable local content safety in general for the user.","supportedPlatforms":["Windows"],"tags":["Rewrite","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\rewrite","registrySubPath":"disablecontentsafety","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableContentSafetySpecificSummarizationUser","uniqueId":3021,"displayName":"Disable local content safety to and from the Summarization scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy setting disables local content safety of the Summarization scenario for the user.\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is enabled, local content safety for the Summarization scenario is disabled for the user.\n- If this policy setting is disabled, local content safety for the Summarization scenario is enabled for the user.\n- If this policy setting is not configured, local content safety for the Summarization scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, local content safety for the Summarization scenario is enabled for the user.\n\nFor this policy setting, the order of priority is:\n1. Disable local content safety to and from the Summarization scenario for the computer.\n2. Disable local content safety in general for the computer.\n3. Disable local content safety to and from the Summarization scenario for the user.\n4. Disable local content safety in general for the user.","supportedPlatforms":["Windows"],"tags":["Summarization","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\summarization","registrySubPath":"disablecontentsafety","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableContentSafetySpecificSummarizationWithReferencesUser","uniqueId":3030,"displayName":"Disable local content safety to and from the Summarization with References scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy setting disables local content safety of the Summarization with References scenario for the user.\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is enabled, local content safety for the Summarization with References scenario is disabled for the user.\n- If this policy setting is disabled, local content safety for the Summarization with References scenario is enabled for the user.\n- If this policy setting is not configured, local content safety for the Summarization with References scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, local content safety for the Summarization with References scenario is enabled for the user.\n\nFor this policy setting, the order of priority is:\n1. Disable local content safety to and from the Summarization with References scenario for the computer.\n2. Disable local content safety in general for the computer.\n3. Disable local content safety to and from the Summarization with References scenario for the user.\n4. Disable local content safety in general for the user.","supportedPlatforms":["Windows"],"tags":["Summarization with References","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\summarizationwithreferences","registrySubPath":"disablecontentsafety","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableContentSafetySpecificTextToTableUser","uniqueId":3048,"displayName":"Disable local content safety to and from the Text to Table scenario for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy setting disables local content safety of the Text to Table scenario for the user.\n\nFor local content safety policy, scenario-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is enabled, local content safety for the Text to Table scenario is disabled for the user.\n- If this policy setting is disabled, local content safety for the Text to Table scenario is enabled for the user.\n- If this policy setting is not configured, local content safety for the Text to Table scenario is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, local content safety for the Text to Table scenario is enabled for the user.\n\nFor this policy setting, the order of priority is:\n1. Disable local content safety to and from the Text to Table scenario for the computer.\n2. Disable local content safety in general for the computer.\n3. Disable local content safety to and from the Text to Table scenario for the user.\n4. Disable local content safety in general for the user.","supportedPlatforms":["Windows"],"tags":["Text to Table","Specific","Content Safety","AI","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\contentsafety\\specific\\texttotable","registrySubPath":"disablecontentsafety","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableDefaultService","uniqueId":2722,"displayName":"Remove Office Presentation Service from the list of online presentation services in PowerPoint and Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to remove Office Presentation Service from the list of online presentation services in PowerPoint and Word. This list appears when a user selects Present Online from the Share tab in Backstage view and in the ribbon in PowerPoint.\n\nIf you enable this policy setting, Office Presentation Service is not shown as an option for presenting online. \n\nIf you disable or do not configure this policy setting, users can select Office Presentation Service to present their PowerPoint or Word file to other users online.","supportedPlatforms":["Windows"],"tags":["Present Online","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast","registrySubPath":"disabledefaultservice","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableDocumentInformationPanel","uniqueId":2530,"displayName":"Disable Document Information Panel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Excel, PowerPoint, and Word users can view document information in the Document Information Panel.The Document Information Panel replaces the modal Properties dialog box in earlier versions of Excel, PowerPoint, and Word, and allows users to view and edit metadata that is associated with the document. Office 2016 developers can create custom Document Information Panels to record a variety of information relevant to the document or the organization. \n\nIf you enable this policy setting, forms and controls do not display in the Document Information Panel. The panel itself will display when users open it, but it will be blank. \n\nIf you disable or do not configure this policy setting, users can view the Document Information Panel.","supportedPlatforms":["Windows"],"tags":["Document Information Panel","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\documentinformationpanel","registrySubPath":"disable","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableFaxOverInternetfeature","uniqueId":2472,"displayName":"Disable Internet Fax feature","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether users can access the Internet Fax feature in Office 2016 applications. \n\nIf you enable this policy setting, Office 2016 users cannot send Internet faxes, and the Internet Fax menu item is removed from the Send sub-menu of the Microsoft Office menu. \n\nIf you disable or do not configure this policy setting, Office 2016 users can use the Internet Fax feature.","supportedPlatforms":["Windows"],"tags":["Fax","Services","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\services\\fax","registrySubPath":"nofax","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisablehyperlinkstowebtemplatesinFileNewandtaskpanes","uniqueId":2886,"displayName":"Disable web templates in File | New and on the Office Start screen","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can download templates from Office.com from within the Office applications.\n\nIf you enable this policy setting, users will not see featured templates from Office.com in File | New and on the Office Start screen and will not be able to download templates from within Office applications.\n\nIf you disable or do not configure this policy setting, users will see featured templates from Office.com in File | New and on the Office Start screen and will be able to download templates from within Office applications.\n\nNote - Enabling this policy setting does not prevent users from downloading templates from Office.com using their Web browsers.","supportedPlatforms":["Windows"],"tags":["Tools | Options | General | Web Options...","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"disablehyperlinkstowebtemplates","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableinclusionofdocumentpropertiesinPDFandXPSoutput","uniqueId":2509,"displayName":"Disable inclusion of document properties in PDF and XPS output","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether document metadata can be saved in PDF and XPS documents. \n\nIf you enable this policy setting, document properties metadata is not exported to PDF and XPS files. \n\nIf you disable this policy setting, document properties metadata will always be saved with PDF and XPS files, and users will not be able to override this configuration. \n\nIf you do not configure this policy setting, if the Microsoft Save as PDF or XPS Add-in for Microsoft Office Programs add-in is installed, document properties are saved as metadata when users save files using the PDF or XPS or Publish as PDF or XPS commands in Access, Excel, InfoPath, PowerPoint, and Word, unless the \"Document properties\" option is unchecked in the Options dialog.","supportedPlatforms":["Windows"],"tags":["Microsoft Save As PDF and XPS add-ins","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\fixedformat","registrySubPath":"disablefixedformatdocproperties","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableInformationRightsManagementUserInterface","uniqueId":2489,"displayName":"Turn off Information Rights Management user interface","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls Information Rights Management (IRM).\n\nIf you enable this policy setting, IRM will be turned off for users.\n\nIf you disable or do not configure this policy setting, users will be able to use IRM.","supportedPlatforms":["Windows"],"tags":["Manage Restricted Permissions","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\drm","registrySubPath":"disable","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableLastMileInAppMessaging","uniqueId":3063,"displayName":"Disable Last-Mile In-App Messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting prevents Office from displaying bizbar messages to the user about last-mile (environmental) issues affecting their experience.\n\nIf you disable or don’t configure this policy setting, Office will display last-mile messages by default as they are encountered.\n\nIf you enable this policy setting, Office will not display the configured last-mile in-app messages when they are encountered.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\fileio","registrySubPath":"disablelastmileinappmessaging","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableLinksOpenRight","uniqueId":2925,"displayName":"Open Office file links in Office Online","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls which version of Office opens when a hyperlink to an Office file stored on OneDrive, OneDrive for Business, or a SharePoint Online team site is selected.\n\nBy default, a hyperlink to a file stored in one of these locations opens the file in the Office client version of Word, Excel, or PowerPoint. This is the version of Office that is installed on the user’s computer. If Office isn’t installed on the user’s computer, the file is opened in the Office Online version of the program in the user’s web browser.\n\nIf you enable this policy setting, a hyperlink to an Office file stored in one of these locations opens the file in the Office Online version of Word, Excel, or PowerPoint. This opens the file in the user’s web browser.\n\nIf you disable or don’t configure this policy setting, a hyperlink to an Office file stored in one of these locations opens the file in the Office client version of Word, Excel, or PowerPoint, if Office is installed on the user’s computer.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"disablelinksopenright","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableLocalFileProcessing","uniqueId":5346,"displayName":"Prevent content that doesn’t use Microsoft 365 cloud storage from being sent to Microsoft for use by some connected experiences","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy setting allows you to control whether content that doesn’t use Microsoft 365 cloud file storage will be sent to Microsoft for use by some connected experiences. “Microsoft 365 cloud file storage” refers to SharePoint and OneDrive.\n\nIf you enable this policy setting, content that doesn’t use Microsoft 365 cloud file storage won’t be sent to Microsoft for use by some connected experiences.\n\nImportant: If you enable this policy setting, some connected experiences won’t be available to your users. For example, automatic alt text, PowerPoint Designer, text predictions, and Translator. Also, Microsoft Copilot for Microsoft 365 features won’t be available to your users.\n\nNote: For more information about which apps this policy setting applies to and which connected experiences won’t be available to your users, see https://go.microsoft.com/fwlink/p/?linkid=2271357.\n\nIf you disable or don’t configure this policy setting, content will be sent to Microsoft for use by some connected experiences, even if the content doesn’t use Microsoft 365 cloud file storage.","supportedPlatforms":["Windows","Mac"],"tags":["Privacy","Cloud Policies Boolean","DisableLocalFileProcessing","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\privacy","registrySubPath":"disablelocalfileprocessing","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableMovie","uniqueId":2893,"displayName":"Disable First Run Movie","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether a video about signing-in to Office is played when Office first runs.\n\nIf you enable this policy setting, the video does not run during Office First Run.\n\nIf you disable or do not configure this policy setting, a video about signing-in to Office plays when Office first runs.","supportedPlatforms":["Windows"],"tags":["First Run","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\firstrun","registrySubPath":"disablemovie","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableOfficeFirstrun","uniqueId":2894,"displayName":"Disable Office First Run on application boot","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether the Office First Run comes up on first application boot if not previously viewed.\n\nIf you enable this policy setting,  the Office First Run does not run on first application boot.\n\nIf you disable or do not configure this policy setting, the Office First Run about signing-in to Office comes up on first application boot if not previously viewed.","supportedPlatforms":["Windows"],"tags":["First Run","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\firstrun","registrySubPath":"bootedrtm","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableOfficeStartGlobal","uniqueId":2885,"displayName":"Disable the Office Start screen for all Office applications","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the Office Start screen appears on boot for all Office applications.\n\nIf you enable this policy setting, users will not see the Office Start screen when they boot any Office application.\n\nIf you disable or do not configure this policy setting, users will see the Office Start screen when they boot their Office applications.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"disableboottoofficestart","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableOfficeStore","uniqueId":1830,"displayName":"Block the Office Store","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to prevent users from using or inserting web add-ins that come from the Office Store.\n\nIf you enable this policy setting, apps from the Office Store are blocked.\n\nIf you disable or do not configure this policy setting, apps from the Office Store are allowed, unless the \"Block Apps for Office\" policy setting is enabled.","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs","registrySubPath":"disableomexcatalogs","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableOfficeTemplates","uniqueId":2887,"displayName":"Hide all Office-provided templates on the Office Start screen and in File | New","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Office-provided templates (from Office.com and shipped with the Office clients) are hidden on the Office Start screen and in File | New.\n\nIf you enable this policy setting, users will not see any Office provided templates on the Office Start screen nor in File | New.\n\nIf you disable or do not configure this policy setting, users will see Office provided templates on the Office Start screen nor in File | New.\n\nNote - enabling this policy setting does not prevent users from downloading templates from Office.com using their Web browsers and does not prevent users from using Office-provided templates installed on their hard drive using Windows Explorer to launch those templates.","supportedPlatforms":["Windows"],"tags":["Tools | Options | General | Web Options...","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"disableofficetemplates","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableOfficeUserRoamingSettings","uniqueId":2843,"displayName":"Disable Roaming Office User Settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Microsoft Office includes the ability to roam settings for specific Office features amongst devices by storing this data in the cloud. This data includes user preferences such as the Office theme. This policy setting controls whether this data is allowed to be stored in the cloud. \n\nIf you enable this policy setting, roaming settings are only stored locally and not synchronized to the Microsoft Office roaming settings web service. \n\nIf you disable or do not configure this policy setting, roaming settings are synchronized with the Microsoft Office roaming settings web service and users can access their data from other devices. \n\nExisting data in the cloud is not affected by this policy.","supportedPlatforms":["Windows"],"tags":["Services","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\roaming","registrySubPath":"roamingsettingsdisabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableOptinWizard","uniqueId":1696,"displayName":"Disable Opt-in Wizard on first run","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users see the Opt-in Wizard the first time they run a Microsoft Office 2016 application. \n\nIf you enable this policy setting, the Opt-in Wizard does not display the first time users run an Office 2016 application. \n\nIf you disable or do not configure this policy setting, the Opt-in Wizard displays the first time users run a Microsoft Office 2016 application, which allows them to opt into Internet--based services that will help improve their Office experience, such as Microsoft Update, the Customer Experience Improvement Program, Office Diagnostics, and Online Help.","supportedPlatforms":["Windows"],"tags":["Trust Center","Privacy","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"shownfirstrunoptin","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisablepasswordtoopenUI","uniqueId":2015,"displayName":"Disable password to open UI","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Office 2016 users can add password encryption to documents. (Users would access this feature in Microsoft Office tab--click Info, click Protect Document, then click Encrypt with Password.)\n \n If you enable this policy setting, users cannot password protect their 2016 Office documents. \n \n\nIf you disable or do not configure this policy setting, users can encrypt their 2016 Office files with passwords.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security","registrySubPath":"disablepasswordui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableProgrammaticAccess","uniqueId":2844,"displayName":"Restrict programmatic access for creating online presentations in PowerPoint and Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to restrict the ability to create an online presentation programmatically in PowerPoint and Word.\n\nIf you enable this policy setting, an online presentation cannot be created programmatically.\n\nIf you disable or do not configure this policy setting, an online presentation can be created programmatically.","supportedPlatforms":["Windows"],"tags":["Present Online","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast","registrySubPath":"disableprogrammaticaccess","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableProofingToolsAdvertisement","uniqueId":2892,"displayName":"Notify users if they do not have proofing tools for a language they use","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn on or turn off notifications that are displayed to users when they use a language in their document but do not have proofing tools installed for that language.\n\nIf you enable this policy setting, users see a message bar when they use a language in their document but do not have proofing tools installed for that language. Users cannot disable this notification because the \"Never show again\" button is not shown, and the checkbox to disable proofing notifications is removed from the Options dialog box.\n\nIf you disable this policy setting, users do not see this message bar.\n\nIf you do not configure this policy setting, users see this message bar. They can disable the notification by clicking the \"Never show again\" button or by clearing a check box in the Options dialog box.","supportedPlatforms":["Windows"],"tags":["Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources","registrySubPath":"disableproofingtoolsadvertisement","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableResourceIDNameMapping","uniqueId":2980,"displayName":"Disable caching when opening server-only files.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls disabling caching when opening server-only files.\n\nCaching files helps Office speed up server-only file opens but could cause conflicts for organizations that rename files or change file contents directly on SharePoint.\n\nThe cache is meant to improve performance so disabling it is expected to hurt performance.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\fileio","registrySubPath":"disableresourceidnamemapping","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableRoamingMruForOnPremServers","uniqueId":2957,"displayName":"Turn off roaming of on-premises file names and metadata","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy setting controls whether file names and metadata for Office files are roamed and appear in the list of recently opened files in an Office app, such as Word, on different devices.\n\nRoaming, which relies on a web-based Microsoft service, occurs when a user signs into Office with the same work or school account on different devices.\n\nNote: This policy setting only applies to Office files that are saved to on-premises instances of SharePoint Server or OneDrive for Business.\n\nIf you enable this policy setting, file names and metadata won't roam and won’t appear in the list of recently opened files in Office apps on other devices, unless the file has been opened on that device.\n\nIf you disable or don't configure this policy setting, file names and metadata will roam and will appear in the list of recently opened files in Office apps on other devices, even if the file hasn’t been opened on that device.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\roaming","registrySubPath":"disableroamingmruforonpremservers","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableScreenshotAutoHyperlink","uniqueId":2877,"displayName":"Do not automatically hyperlink screenshots","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to specify whether or not Word, PowerPoint, Excel or Outlook automatically binds hyperlink to a screenshot inserted through the Insert Screenshot tool, if the screenshot is of an Internet Explorer browser window.\n\nIf you enable this policy setting, Word, PowerPoint, Excel and Outlook does not automatically bind  hyperlinks to  screenshot of Internet Explorer browser windows.\n\nIf you disable or do not configure this policy setting, Word, PowerPoint, Excel and Outlook automatically binds a hyperlink to screenshots of Internet Explorer browser windows.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\gfx","registrySubPath":"disablescreenshotautohyperlink","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableSmartDocumentsuseofmanifests","uniqueId":2470,"displayName":"Disable Smart Document's use of manifests","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting controls whether Office 2016 applications can load an XML expansion pack manifest file with a Smart Document. \n\nAn XML expansion pack is the group of files that constitutes a Smart Document in Excel and Word. You package one or more components that provide the logic needed for a Smart Document by using an XML expansion pack. These components can include any type of file, including XML schemas, Extensible Stylesheet Language Transforms (XSLTs), dynamic-link libraries (DLLs), and image files, as well as additional XML files, HTML files, Word files, Excel files, and text files. \n\nThe key component to building an XML expansion pack is creating an XML expansion pack manifest file. By creating this file, you specify the locations of all files that make up the XML expansion pack, as well as information that instructs Office 2016 how to set up the files for your Smart Document. The XML expansion pack can also contain information about how to set up some files, such as how to install and register a COM object required by the XML expansion pack. \n\nIf you enable this policy setting, Office 2016 applications cannot load XML expansion packs with Smart Documents. \n\nIf you disable or do not configure this policy setting, Office 2016 applications can load an XML expansion pack manifest file with a Smart Document.","supportedPlatforms":["Windows"],"tags":["Smart Documents (Word, Excel)","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\smart tag","registrySubPath":"neverloadmanifests","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableStrictVbaRefsSecurityPolicy","uniqueId":2963,"displayName":"Disable additional security checks on VBA library references that may refer to unsafe locations on the local machine","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting restricts VBA to checking project library references only against the registry and trusted zones. By default VBA performs additional checks against library paths to prevent loading references from potentially unsafe locations on the local machine as well. It is recommended that this setting remain 0 or unset to allow for the more secure default behavior. Only enable this setting if the default behavior is causing compatibility issues with critical solutions, and then, only to provide time to migrate the solutions to address the less secure behavior, at which point the setting should be turned off again.\n      ","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\vba\\security","registrySubPath":"disablestrictvbarefssecurity","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableTargetedMessaging","uniqueId":2888,"displayName":"Hide dynamic lifecycle messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether dynamic lifecycle messages are displayed in Office applications.\n\nA dynamic lifecycle message appears as a notification in an Office application. This message is similar to a default lifecycle message, but provides additional information. For example, a message that reminds users to renew their subscription that also includes information to help them renew. Office periodically connects to the Internet and contacts Microsoft to determine if there are any relevant messages to display.\n\nIf you enable this policy setting, Office won’t check for these types of messages, but, default lifecycle messages still display in Office applications.\n\nIf you disable or don’t configure this policy setting, Office checks for these types of messages and displays them.","supportedPlatforms":["Windows"],"tags":["Tools | Options | General | Web Options...","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\targetedmessagingservice","registrySubPath":"disabletargetedmessaging","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisabletheOfficeclientfrompolling","uniqueId":2546,"displayName":"Disable the Office client from polling the SharePoint Server for published links","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting controls whether Office 2016 applications can poll Office servers to retrieve lists of published links. \n\nIf you enable this policy setting, Office 2016 applications cannot poll an Office server for published links. \n\nIf you disable or do not configure this policy setting, users of Office 2016 applications can see and use links to Microsoft SharePoint Server sites from those applications. You can configure published links to Office applications during initial deployment, and can add or change links as part of regular operations. These links appear on the My SharePoint Sites tab of the Open, Save, and Save As dialog boxes when opening and saving documents from these applications. Links can be targeted so that they only appear to users who are members of particular audiences. \n\nNote - This policy setting applies to Microsoft SharePoint Server specifically. It does not apply to Microsoft SharePoint Foundation.","supportedPlatforms":["Windows"],"tags":["Server Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\portal","registrySubPath":"linkpublishingdisabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisabletheuserfromsettingthePersonalSiteURL","uniqueId":2539,"displayName":"Disable the user from setting the Personal Site URL","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This setting will disable the Office client applications from setting the personal site URL in the Active Directory.","supportedPlatforms":["Windows"],"tags":["Server Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\portal","registrySubPath":"disablesetpersonalsite","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUIAccess","uniqueId":1553,"displayName":"Disallow in Access","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from customizing both the Quick Access Toolbar and Ribbon through the user interface (UI).\n\nIf you enable this policy setting, the following UI entry points are turned off: the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, and the Quick Access Toolbar and Ribbon customization options on the right-click menu on the Ribbon.\n\nIf you disable or do not configure this policy setting, users can customize the Quick Access Toolbar and Ribbon through both the application’s Office Center dialog box, and the right-click menu on the Ribbon.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\access","registrySubPath":"disabletoolbarcustomizationui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUIExcel","uniqueId":1551,"displayName":"Disallow in Excel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from customizing both the Quick Access Toolbar and Ribbon through the user interface (UI).\n\nIf you enable this policy setting, the following UI entry points are turned off: the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, and the Quick Access Toolbar and Ribbon customization options on the right-click menu on the Ribbon.\n\nIf you disable or do not configure this policy setting, users can customize the Quick Access Toolbar and Ribbon through both the application’s Office Center dialog box, and the right-click menu on the Ribbon.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\excel","registrySubPath":"disabletoolbarcustomizationui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUIInfoPath","uniqueId":1560,"displayName":"Disallow in InfoPath","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from customizing both the Quick Access Toolbar and Ribbon through the user interface (UI).\n\nIf you enable this policy setting, the following UI entry points are turned off: the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, and the Quick Access Toolbar and Ribbon customization options on the right-click menu on the Ribbon.\n\nIf you disable or do not configure this policy setting, users can customize the Quick Access Toolbar and Ribbon through both the application’s Office Center dialog box, and the right-click menu on the Ribbon.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\infopath","registrySubPath":"msoriddisabletoolbarcustomizationuiinfopath","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUIOneNote","uniqueId":1559,"displayName":"Disallow in OneNote","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from customizing both the Quick Access Toolbar and Ribbon through the user interface (UI).\n\nIf you enable this policy setting, the following UI entry points are turned off: the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, and the Quick Access Toolbar and Ribbon customization options on the right-click menu on the Ribbon.\n\nIf you disable or do not configure this policy setting, users can customize the Quick Access Toolbar and Ribbon through both the application’s Office Center dialog box, and the right-click menu on the Ribbon.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\onenote","registrySubPath":"disabletoolbarcustomizationui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUIOutlook","uniqueId":1554,"displayName":"Disallow in Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from customizing both the Quick Access Toolbar and Ribbon through the user interface (UI).\n\nIf you enable this policy setting, the following UI entry points are turned off: the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, and the Quick Access Toolbar and Ribbon customization options on the right-click menu on the Ribbon.\n\nIf you disable or do not configure this policy setting, users can customize the Quick Access Toolbar and Ribbon through both the application’s Office Center dialog box, and the right-click menu on the Ribbon.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\outlook","registrySubPath":"disabletoolbarcustomizationui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableToolbarCustomizationUIPolicy","uniqueId":1562,"displayName":"Turn off user customizations via UI","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUIWord","logicalOperator":"exists","values":null},{"dependee":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUIExcel","logicalOperator":"exists","values":null},{"dependee":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUIPowerPoint","logicalOperator":"exists","values":null},{"dependee":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUIAccess","logicalOperator":"exists","values":null},{"dependee":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUIOutlook","logicalOperator":"exists","values":null},{"dependee":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUISPD","logicalOperator":"exists","values":null},{"dependee":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUIPublisher","logicalOperator":"exists","values":null},{"dependee":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUIProject","logicalOperator":"exists","values":null},{"dependee":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUIVisio","logicalOperator":"exists","values":null},{"dependee":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUIOneNote","logicalOperator":"exists","values":null},{"dependee":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUIInfoPath","logicalOperator":"exists","values":null},{"dependee":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUISPW","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting can prevent users from customizing both the Quick Access Toolbar and Ribbon through the user interface (UI).\n\nIf you enable this policy setting, the following UI entry points are turned off: the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, and the Quick Access Toolbar and Ribbon customization options on the right-click menu on the Ribbon.\n\nIf you disable or do not configure this policy setting, users can customize the Quick Access Toolbar and Ribbon through both the application’s Office Center dialog box, and the right-click menu on the Ribbon.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUIPowerPoint","uniqueId":1552,"displayName":"Disallow in PowerPoint","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from customizing both the Quick Access Toolbar and Ribbon through the user interface (UI).\n\nIf you enable this policy setting, the following UI entry points are turned off: the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, and the Quick Access Toolbar and Ribbon customization options on the right-click menu on the Ribbon.\n\nIf you disable or do not configure this policy setting, users can customize the Quick Access Toolbar and Ribbon through both the application’s Office Center dialog box, and the right-click menu on the Ribbon.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\powerpoint","registrySubPath":"disabletoolbarcustomizationui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUIProject","uniqueId":1557,"displayName":"Disallow in Project","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from customizing both the Quick Access Toolbar and Ribbon through the user interface (UI).\n\nIf you enable this policy setting, the following UI entry points are turned off: the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, and the Quick Access Toolbar and Ribbon customization options on the right-click menu on the Ribbon.\n\nIf you disable or do not configure this policy setting, users can customize the Quick Access Toolbar and Ribbon through both the application’s Office Center dialog box, and the right-click menu on the Ribbon.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\project","registrySubPath":"disabletoolbarcustomizationui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUIPublisher","uniqueId":1556,"displayName":"Disallow in Publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from customizing both the Quick Access Toolbar and Ribbon through the user interface (UI).\n\nIf you enable this policy setting, the following UI entry points are turned off: the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, and the Quick Access Toolbar and Ribbon customization options on the right-click menu on the Ribbon.\n\nIf you disable or do not configure this policy setting, users can customize the Quick Access Toolbar and Ribbon through both the application’s Office Center dialog box, and the right-click menu on the Ribbon.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\publisher","registrySubPath":"disabletoolbarcustomizationui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUISPD","uniqueId":1555,"displayName":"Disallow in SharePoint Designer","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from customizing both the Quick Access Toolbar and Ribbon through the user interface (UI).\n\nIf you enable this policy setting, the following UI entry points are turned off: the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, and the Quick Access Toolbar and Ribbon customization options on the right-click menu on the Ribbon.\n\nIf you disable or do not configure this policy setting, users can customize the Quick Access Toolbar and Ribbon through both the application’s Office Center dialog box, and the right-click menu on the Ribbon.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\sharepoint designer","registrySubPath":"disabletoolbarcustomizationui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUISPW","uniqueId":1561,"displayName":"Disallow in SharePoint Workspace","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from customizing both the Quick Access Toolbar and Ribbon through the user interface (UI).\n\nIf you enable this policy setting, the following UI entry points are turned off: the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, and the Quick Access Toolbar and Ribbon customization options on the right-click menu on the Ribbon.\n\nIf you disable or do not configure this policy setting, users can customize the Quick Access Toolbar and Ribbon through both the application’s Office Center dialog box, and the right-click menu on the Ribbon.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\groove","registrySubPath":"disabletoolbarcustomizationui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUIVisio","uniqueId":1558,"displayName":"Disallow in Visio","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from customizing both the Quick Access Toolbar and Ribbon through the user interface (UI).\n\nIf you enable this policy setting, the following UI entry points are turned off: the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, and the Quick Access Toolbar and Ribbon customization options on the right-click menu on the Ribbon.\n\nIf you disable or do not configure this policy setting, users can customize the Quick Access Toolbar and Ribbon through both the application’s Office Center dialog box, and the right-click menu on the Ribbon.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\visio","registrySubPath":"disabletoolbarcustomizationui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableToolbarCustomizationUIPolicy;L_DisableToolbarCustomizationUIWord","uniqueId":1550,"displayName":"Disallow in Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from customizing both the Quick Access Toolbar and Ribbon through the user interface (UI).\n\nIf you enable this policy setting, the following UI entry points are turned off: the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, and the Quick Access Toolbar and Ribbon customization options on the right-click menu on the Ribbon.\n\nIf you disable or do not configure this policy setting, users can customize the Quick Access Toolbar and Ribbon through both the application’s Office Center dialog box, and the right-click menu on the Ribbon.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\word","registrySubPath":"disabletoolbarcustomizationui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableTrainingOfAdaptiveFloatieUser","uniqueId":2984,"displayName":"Disable local training of the Adaptive Floatie feature for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy setting disables local training of the Adaptive Floatie feature for the user.\n\nFor local training policy, feature-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is enabled, local training of the Adaptive Floatie feature is disabled for the user.\n- If this policy setting is disabled, local training of the Adaptive Floatie feature is enabled for the user.\n- If this policy setting is not configured, local training of the Adaptive Floatie feature is determined by lower priority policy settings.\n- If this policy setting is not configured and lower priority policy settings are also not configured, local training of the Adaptive Floatie feature is enabled for the user.\n\nFor this policy setting, the order of priority is:\n1. Disable local training of the Adaptive Floatie feature for the computer.\n2. Disable local training of all features for the computer.\n3. Disable local training of the Adaptive Floatie feature for the user.\n4. Disable local training of all features for the user.","supportedPlatforms":["Windows"],"tags":["Adaptive Floatie","Specific","Training","AI","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\training\\specific\\adaptivefloatie","registrySubPath":"disabletrainingofadaptivefloatie","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableTrainingUser","uniqueId":2983,"displayName":"Disable local training of all features for the user.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy setting disables local training of all features for the user.\n\nFor local training policy, feature-specific settings are prioritized over general settings and computer settings are prioritized over user settings.\n\nIf a higher priority policy setting is not configured, then:\n- If this policy setting is enabled, local training of all features is disabled for the user.\n- If this policy setting is disabled, local training of all features is enabled for the user.\n- If this policy setting is not configured, local training of all features is enabled for the user.\n\nFor this policy setting, the order of priority is:\n1. Disable local training of [a specific feature] for the computer.\n2. Disable local training of all features for the computer.\n3. Disable local training of [a specific feature] for the user.\n4. Disable local training of all features for the user.","supportedPlatforms":["Windows"],"tags":["General","Training","AI","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ai\\training\\general","registrySubPath":"disabletraining","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Disableuserfromsettingpersonalsiteasdefaultlocation","uniqueId":1596,"displayName":"Disable user from setting personal site as default location","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checked: User is not able to define the default location to the personal site. | Unchecked: Default location is not restricted.","supportedPlatforms":["Windows"],"tags":["Shared Workspace","Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\portal","registrySubPath":"disablesetpersonalsite","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_disablevbaforofficeapplications319","uniqueId":2006,"displayName":"Disable VBA for Office applications","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting will prevent Office applications from using Visual Basic for Applications (VBA).\n\nIf you enable this policy setting, you will disable Visual Basic for Applications (VBA) for Office applications.\n\nIf you disable or do not configure this policy setting, Visual Basic for Applications (VBA) will be enabled for Office applications.\n\nSee the Office Resource Kit for more important information about configuring security settings.\n\nNote: Changing this setting will not install or remove the VBA files from the computer.\n","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"vbaoff","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisableVSTOLegacy1Or2","uniqueId":2945,"displayName":"Disable VSTO 2003 and 2005 document-level customizations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to configure the load behavior of Visual Studio Tools for Office (VSTO) 2003 and 2005 document-level customizations.\n\nIf you enable this policy setting, VSTO 2003 and 2005 document-level customizations will not be loaded.\n\nIf you disable or do not configure this policy setting, VSTO 2003 and 2005 document-level customizations will remain enabled.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies","VBA"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\vsto","registrySubPath":"vstolegacy1or2disable","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisablewebviewintheOfficefiledialogs","uniqueId":2720,"displayName":"Disable web view in the Office file dialog boxes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\filedialogwebviewsettings","registrySubPath":"showallfilesandfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Disallowcustomcoversheet","uniqueId":2473,"displayName":"Disallow custom cover sheet","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Disables the custom fax cover sheet by displaying the message, \"This option has been disabled by administrative policy\" when the user clicks the Custom button in the Fax Service pane of the email message.","supportedPlatforms":["Windows"],"tags":["Fax","Services","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\services\\fax","registrySubPath":"disallowcustomcoversheet","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DisallowedRoamingMruDomains;L_DisallowedDomainList","uniqueId":2975,"displayName":"Blocked Domains:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"\nThis policy setting controls whether file names and metadata for Office files are roamed and appear in the list of recently opened files in an Office app, such as Word, on different devices.\n\nRoaming, which relies on a web-based Microsoft service, occurs when a user signs into Office with the same work or school account on different devices.\n\nNote: This policy is applied to any Office files stored on a specified list of server domains. The set of disallowed domains is a semicolon separated list: \"*.contoso.com;service.microsoft.com\".\n\nIf you enable this policy setting, file names and metadata won't roam and won’t appear in the list of recently opened files in Office apps on other devices, unless the file has been opened on that device.\n\nIf you disable or don't configure this policy setting, file names and metadata will roam and will appear in the list of recently opened files in Office apps on other devices, even if the file hasn’t been opened on that device.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\roaming","registrySubPath":"disallowedroamingmrudomains","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_DisallowedRoamingMruDomains","uniqueId":2976,"displayName":"Turn off roaming of file names and metadata by server domain","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_DisallowedRoamingMruDomains;L_DisallowedDomainList","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\nThis policy setting controls whether file names and metadata for Office files are roamed and appear in the list of recently opened files in an Office app, such as Word, on different devices.\n\nRoaming, which relies on a web-based Microsoft service, occurs when a user signs into Office with the same work or school account on different devices.\n\nNote: This policy is applied to any Office files stored on a specified list of server domains. The set of disallowed domains is a semicolon separated list: \"*.contoso.com;service.microsoft.com\".\n\nIf you enable this policy setting, file names and metadata won't roam and won’t appear in the list of recently opened files in Office apps on other devices, unless the file has been opened on that device.\n\nIf you disable or don't configure this policy setting, file names and metadata will roam and will appear in the list of recently opened files in Office apps on other devices, even if the file hasn’t been opened on that device.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_DisalowconvertdocumentPolicy","uniqueId":2701,"displayName":"Disallow Convert Document (Excel, PowerPoint, Word)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"BlockConvert","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"AllowConvert","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Disallow users to convert files that are in compatibility mode via the \"Convert\" command for Excel, PowerPoint, and Word.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"convertdocument","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_Displayhelpin","uniqueId":2043,"displayName":"Display help in","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Displayhelpin;L_displayhelpin336","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the default language of online Help.  In addition to configuring this setting, consider enabling the same language in the 'Enabled Editing Languages' policy node.","supportedPlatforms":["Windows"],"tags":["Display Language","Language Preferences","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Displayhelpin;L_displayhelpin336","uniqueId":2042,"displayName":"Display help in","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"(same as menus and dialog boxes)","description":"","tags":[],"dependencyGroup":null},{"value":1078,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Afrikaans","description":"","tags":[],"dependencyGroup":null},{"value":1052,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Albanian","description":"","tags":[],"dependencyGroup":null},{"value":1118,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Amharic","description":"","tags":[],"dependencyGroup":null},{"value":1025,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic","description":"","tags":[],"dependencyGroup":null},{"value":1067,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Armenian","description":"","tags":[],"dependencyGroup":null},{"value":1101,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Assamese","description":"","tags":[],"dependencyGroup":null},{"value":1068,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Azerbaijani (Latin)","description":"","tags":[],"dependencyGroup":null},{"value":2117,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bangla (Bangladesh)","description":"","tags":[],"dependencyGroup":null},{"value":1093,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bangla (India)","description":"","tags":[],"dependencyGroup":null},{"value":1069,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Basque","description":"","tags":[],"dependencyGroup":null},{"value":1059,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Belarusian","description":"","tags":[],"dependencyGroup":null},{"value":5146,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bosnian (Latin)","description":"","tags":[],"dependencyGroup":null},{"value":1026,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bulgarian","description":"","tags":[],"dependencyGroup":null},{"value":1027,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Catalan","description":"","tags":[],"dependencyGroup":null},{"value":1170,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Central Kurdish (Iraq)","description":"","tags":[],"dependencyGroup":null},{"value":1116,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cherokee","description":"","tags":[],"dependencyGroup":null},{"value":2052,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Chinese (Simplified)","description":"","tags":[],"dependencyGroup":null},{"value":1028,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Chinese (Traditional)","description":"","tags":[],"dependencyGroup":null},{"value":1050,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Croatian","description":"","tags":[],"dependencyGroup":null},{"value":1029,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Czech","description":"","tags":[],"dependencyGroup":null},{"value":1030,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Danish","description":"","tags":[],"dependencyGroup":null},{"value":1164,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dari","description":"","tags":[],"dependencyGroup":null},{"value":1043,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dutch","description":"","tags":[],"dependencyGroup":null},{"value":1033,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English","description":"","tags":[],"dependencyGroup":null},{"value":1061,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Estonian","description":"","tags":[],"dependencyGroup":null},{"value":1124,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Filipino","description":"","tags":[],"dependencyGroup":null},{"value":1035,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Finnish","description":"","tags":[],"dependencyGroup":null},{"value":1036,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"French","description":"","tags":[],"dependencyGroup":null},{"value":1110,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Galician","description":"","tags":[],"dependencyGroup":null},{"value":1079,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Georgian","description":"","tags":[],"dependencyGroup":null},{"value":1031,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"German","description":"","tags":[],"dependencyGroup":null},{"value":1032,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Greek","description":"","tags":[],"dependencyGroup":null},{"value":1095,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gujarati","description":"","tags":[],"dependencyGroup":null},{"value":1128,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hausa (Latin)","description":"","tags":[],"dependencyGroup":null},{"value":1037,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hebrew","description":"","tags":[],"dependencyGroup":null},{"value":1081,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hindi","description":"","tags":[],"dependencyGroup":null},{"value":1038,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hungarian","description":"","tags":[],"dependencyGroup":null},{"value":1039,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Icelandic","description":"","tags":[],"dependencyGroup":null},{"value":1136,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Igbo","description":"","tags":[],"dependencyGroup":null},{"value":1057,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Indonesian","description":"","tags":[],"dependencyGroup":null},{"value":2141,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Inuktitut (Latin)","description":"","tags":[],"dependencyGroup":null},{"value":2108,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Irish","description":"","tags":[],"dependencyGroup":null},{"value":1076,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"isiXhosa","description":"","tags":[],"dependencyGroup":null},{"value":1077,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"isiZulu","description":"","tags":[],"dependencyGroup":null},{"value":1040,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Italian","description":"","tags":[],"dependencyGroup":null},{"value":1041,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Japanese","description":"","tags":[],"dependencyGroup":null},{"value":1099,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kannada","description":"","tags":[],"dependencyGroup":null},{"value":1087,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kazakh","description":"","tags":[],"dependencyGroup":null},{"value":1107,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Khmer","description":"","tags":[],"dependencyGroup":null},{"value":1158,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"K'iche","description":"","tags":[],"dependencyGroup":null},{"value":1159,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kinyarwanda","description":"","tags":[],"dependencyGroup":null},{"value":1089,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Swahili","description":"","tags":[],"dependencyGroup":null},{"value":1111,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Konkani","description":"","tags":[],"dependencyGroup":null},{"value":1042,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Korean","description":"","tags":[],"dependencyGroup":null},{"value":1088,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kyrgyz","description":"","tags":[],"dependencyGroup":null},{"value":1062,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Latvian","description":"","tags":[],"dependencyGroup":null},{"value":1063,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Lithuanian","description":"","tags":[],"dependencyGroup":null},{"value":1134,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Luxembourgish","description":"","tags":[],"dependencyGroup":null},{"value":1086,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Malay (Malaysia)","description":"","tags":[],"dependencyGroup":null},{"value":1100,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Malayalam","description":"","tags":[],"dependencyGroup":null},{"value":1082,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Maltese","description":"","tags":[],"dependencyGroup":null},{"value":1153,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Maori","description":"","tags":[],"dependencyGroup":null},{"value":1102,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Marathi","description":"","tags":[],"dependencyGroup":null},{"value":1104,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Mongolian (Cyrillic)","description":"","tags":[],"dependencyGroup":null},{"value":1071,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Macedonian","description":"","tags":[],"dependencyGroup":null},{"value":1121,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Nepali","description":"","tags":[],"dependencyGroup":null},{"value":1044,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Norwegian (Bokmal)","description":"","tags":[],"dependencyGroup":null},{"value":2068,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Norwegian (Nynorsk)","description":"","tags":[],"dependencyGroup":null},{"value":1096,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Odia","description":"","tags":[],"dependencyGroup":null},{"value":1065,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Persian","description":"","tags":[],"dependencyGroup":null},{"value":1045,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Polish","description":"","tags":[],"dependencyGroup":null},{"value":1046,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Portuguese (Brazil)","description":"","tags":[],"dependencyGroup":null},{"value":2070,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Portuguese (Portugal)","description":"","tags":[],"dependencyGroup":null},{"value":1094,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Punjabi","description":"","tags":[],"dependencyGroup":null},{"value":2118,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Punjabi (Pakistan)","description":"","tags":[],"dependencyGroup":null},{"value":3179,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Quechua (Peru)","description":"","tags":[],"dependencyGroup":null},{"value":1048,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Romanian","description":"","tags":[],"dependencyGroup":null},{"value":1049,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Russian","description":"","tags":[],"dependencyGroup":null},{"value":1169,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Scottish Gaelic (United Kingdom)","description":"","tags":[],"dependencyGroup":null},{"value":3098,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Serbian (Cyrillic, Serbia and Montenegro (Former))","description":"","tags":[],"dependencyGroup":null},{"value":7194,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Serbian (Cyrillic, Bosnia and Herzegovina)","description":"","tags":[],"dependencyGroup":null},{"value":2074,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Serbian (Latin, Serbia and Montenegro (Former))","description":"","tags":[],"dependencyGroup":null},{"value":1132,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sesotho sa Leboa","description":"","tags":[],"dependencyGroup":null},{"value":1074,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Setswana","description":"","tags":[],"dependencyGroup":null},{"value":2137,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sindhi (Arabic)","description":"","tags":[],"dependencyGroup":null},{"value":1115,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sinhala","description":"","tags":[],"dependencyGroup":null},{"value":1051,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Slovak","description":"","tags":[],"dependencyGroup":null},{"value":1060,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Slovenian","description":"","tags":[],"dependencyGroup":null},{"value":3082,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish","description":"","tags":[],"dependencyGroup":null},{"value":1053,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Swedish","description":"","tags":[],"dependencyGroup":null},{"value":1064,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tajik","description":"","tags":[],"dependencyGroup":null},{"value":1097,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tamil","description":"","tags":[],"dependencyGroup":null},{"value":1092,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tatar","description":"","tags":[],"dependencyGroup":null},{"value":1098,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Telugu","description":"","tags":[],"dependencyGroup":null},{"value":1054,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Thai","description":"","tags":[],"dependencyGroup":null},{"value":1139,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tigrinya (Ethiopia)","description":"","tags":[],"dependencyGroup":null},{"value":1055,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Turkish","description":"","tags":[],"dependencyGroup":null},{"value":1090,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Turkmen","description":"","tags":[],"dependencyGroup":null},{"value":1058,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Ukrainian","description":"","tags":[],"dependencyGroup":null},{"value":1056,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Urdu","description":"","tags":[],"dependencyGroup":null},{"value":1152,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Uyghur (China)","description":"","tags":[],"dependencyGroup":null},{"value":1091,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Uzbek (Latin)","description":"","tags":[],"dependencyGroup":null},{"value":2051,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Valencian","description":"","tags":[],"dependencyGroup":null},{"value":1066,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Vietnamese","description":"","tags":[],"dependencyGroup":null},{"value":1106,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Welsh","description":"","tags":[],"dependencyGroup":null},{"value":1160,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Wolof","description":"","tags":[],"dependencyGroup":null},{"value":1130,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yoruba","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the default language of online Help.  In addition to configuring this setting, consider enabling the same language in the 'Enabled Editing Languages' policy node.","supportedPlatforms":["Windows"],"tags":["Display Language","Language Preferences","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources","registrySubPath":"helplanguage","registryType":"REG_DWORD","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources","registrySubPath":"helplanguagetag","enforcedValues":{"(same as menus and dialog boxes)":"x-none","afrikaans":"af-ZA","albanian":"sq-AL","amharic":"am-ET","arabic":"ar-SA","armenian":"hy-AM","assamese":"as-IN","azerbaijani (Latin)":"az-Latn-AZ","bangla (Bangladesh)":"bn-BD","bangla (India)":"bn-IN","basque":"eu-ES","belarusian":"be-BY","bosnian (Latin)":"bs-Latn-BA","bulgarian":"bg-BG","catalan":"ca-ES","central Kurdish (Iraq)":"ku-Arab-IQ","cherokee":"chr-Cher-US","chinese (Simplified)":"zh-CN","chinese (Traditional)":"zh-TW","croatian":"hr-HR","czech":"cs-CZ","danish":"da-DK","dari":"prs-AF","dutch":"nl-NL","english":"en-US","estonian":"et-EE","filipino":"fil-PH","finnish":"fi-FI","french":"fr-FR","galician":"gl-ES","georgian":"ka-GE","german":"de-DE","greek":"el-GR","gujarati":"gu-IN","hausa (Latin)":"ha-Latn-NG","hebrew":"he-IL","hindi":"hi-IN","hungarian":"hu-HU","icelandic":"is-IS","igbo":"ig-NG","indonesian":"id-ID","inuktitut (Latin)":"iu-Latn-CA","irish":"ga-IE","isiXhosa":"xh-ZA","isiZulu":"zu-ZA","italian":"it-IT","japanese":"ja-JP","kannada":"kn-IN","kazakh":"kk-KZ","khmer":"km-KH","k'iche":"quc-Latn-GT","kinyarwanda":"rw-RW","swahili":"sw-KE","konkani":"kok-IN","korean":"ko-KR","kyrgyz":"ky-KG","latvian":"lv-LV","lithuanian":"lt-LT","luxembourgish":"lb-LU","malay (Malaysia)":"ms-MY","malayalam":"ml-IN","maltese":"mt-MT","maori":"mi-NZ","marathi":"mr-IN","mongolian (Cyrillic)":"mn-MN","macedonian":"mk-MK","nepali":"ne-NP","norwegian (Bokmal)":"nb-NO","norwegian (Nynorsk)":"nn-NO","odia":"or-IN","persian":"fa-IR","polish":"pl-PL","portuguese (Brazil)":"pt-BR","portuguese (Portugal)":"pt-PT","punjabi":"pa-IN","punjabi (Pakistan)":"pa-Arab-PK","quechua (Peru)":"quz-PE","romanian":"ro-RO","russian":"ru-RU","scottish Gaelic (United Kingdom)":"gd-GB","serbian (Cyrillic, Serbia and Montenegro (Former))":"sr-Cyrl-CS","serbian (Cyrillic, Bosnia and Herzegovina)":"sr-Cyrl-BA","serbian (Latin, Serbia and Montenegro (Former))":"sr-Latn-CS","sesotho sa Leboa":"nso-ZA","setswana":"tn-ZA","sindhi (Arabic)":"sd-Arab-PK","sinhala":"si-LK","slovak":"sk-SK","slovenian":"sl-SI","spanish":"es-ES","swedish":"sv-SE","tajik":"tg-Cyrl-TJ","tamil":"ta-IN","tatar":"tt-RU","telugu":"te-IN","thai":"th-TH","tigrinya (Ethiopia)":"ti-ET","turkish":"tr-TR","turkmen":"tk-TM","ukrainian":"uk-UA","urdu":"ur-PK","uyghur (China)":"ug-CN","uzbek (Latin)":"uz-Latn-UZ","valencian":"ca-ES-valencia","vietnamese":"vi-VN","welsh":"cy-GB","wolof":"wo-SN","yoruba":"yo-NG"}}]}}},{"id":"office16;L_DisplayLegacyGALDialog","uniqueId":2319,"displayName":"Display legacy GAL dialog","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to specify the way contact information is displayed.\n\nIf you enable this policy setting the global address list (GAL) dialog is displayed instead of the Contact Card when users double click a contact in Outlook. \n\nIf you disable or do not configure this policy setting the Contact Card is displayed when users double click a contact in Outlook.","supportedPlatforms":["Windows"],"tags":["Contact Card","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnonlegacygaldialog","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Displaymenusanddialogboxesin","uniqueId":2041,"displayName":"Display menus and dialog boxes in","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Displaymenusanddialogboxesin;L_displaymenusanddialogboxesin334","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the display language of the user interface for all Office 2016 programs.  In addition to configuring this setting, consider enabling the same language in the 'Enabled Editing Languages' policy node.","supportedPlatforms":["Windows"],"tags":["Display Language","Language Preferences","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Displaymenusanddialogboxesin;L_displaymenusanddialogboxesin334","uniqueId":2040,"displayName":"Display menus and dialog boxes in","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"(same as the system)","description":"","tags":[],"dependencyGroup":null},{"value":1078,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Afrikaans","description":"","tags":[],"dependencyGroup":null},{"value":1052,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Albanian","description":"","tags":[],"dependencyGroup":null},{"value":1118,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Amharic","description":"","tags":[],"dependencyGroup":null},{"value":1025,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic","description":"","tags":[],"dependencyGroup":null},{"value":1067,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Armenian","description":"","tags":[],"dependencyGroup":null},{"value":1101,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Assamese","description":"","tags":[],"dependencyGroup":null},{"value":1068,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Azerbaijani (Latin)","description":"","tags":[],"dependencyGroup":null},{"value":2117,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bangla (Bangladesh)","description":"","tags":[],"dependencyGroup":null},{"value":1093,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bangla (India)","description":"","tags":[],"dependencyGroup":null},{"value":1069,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Basque","description":"","tags":[],"dependencyGroup":null},{"value":1059,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Belarusian","description":"","tags":[],"dependencyGroup":null},{"value":5146,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bosnian (Latin)","description":"","tags":[],"dependencyGroup":null},{"value":1026,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bulgarian","description":"","tags":[],"dependencyGroup":null},{"value":1027,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Catalan","description":"","tags":[],"dependencyGroup":null},{"value":1170,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Central Kurdish (Iraq)","description":"","tags":[],"dependencyGroup":null},{"value":1116,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cherokee","description":"","tags":[],"dependencyGroup":null},{"value":2052,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Chinese (Simplified)","description":"","tags":[],"dependencyGroup":null},{"value":1028,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Chinese (Traditional)","description":"","tags":[],"dependencyGroup":null},{"value":1050,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Croatian","description":"","tags":[],"dependencyGroup":null},{"value":1029,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Czech","description":"","tags":[],"dependencyGroup":null},{"value":1030,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Danish","description":"","tags":[],"dependencyGroup":null},{"value":1164,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dari","description":"","tags":[],"dependencyGroup":null},{"value":1043,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dutch","description":"","tags":[],"dependencyGroup":null},{"value":1033,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English","description":"","tags":[],"dependencyGroup":null},{"value":1061,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Estonian","description":"","tags":[],"dependencyGroup":null},{"value":1124,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Filipino","description":"","tags":[],"dependencyGroup":null},{"value":1035,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Finnish","description":"","tags":[],"dependencyGroup":null},{"value":1036,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"French","description":"","tags":[],"dependencyGroup":null},{"value":1110,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Galician","description":"","tags":[],"dependencyGroup":null},{"value":1079,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Georgian","description":"","tags":[],"dependencyGroup":null},{"value":1031,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"German","description":"","tags":[],"dependencyGroup":null},{"value":1032,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Greek","description":"","tags":[],"dependencyGroup":null},{"value":1095,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gujarati","description":"","tags":[],"dependencyGroup":null},{"value":1128,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hausa (Latin)","description":"","tags":[],"dependencyGroup":null},{"value":1037,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hebrew","description":"","tags":[],"dependencyGroup":null},{"value":1081,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hindi","description":"","tags":[],"dependencyGroup":null},{"value":1038,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hungarian","description":"","tags":[],"dependencyGroup":null},{"value":1039,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Icelandic","description":"","tags":[],"dependencyGroup":null},{"value":1136,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Igbo","description":"","tags":[],"dependencyGroup":null},{"value":1057,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Indonesian","description":"","tags":[],"dependencyGroup":null},{"value":2141,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Inuktitut (Latin)","description":"","tags":[],"dependencyGroup":null},{"value":2108,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Irish","description":"","tags":[],"dependencyGroup":null},{"value":1076,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"isiXhosa","description":"","tags":[],"dependencyGroup":null},{"value":1077,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"isiZulu","description":"","tags":[],"dependencyGroup":null},{"value":1040,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Italian","description":"","tags":[],"dependencyGroup":null},{"value":1041,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Japanese","description":"","tags":[],"dependencyGroup":null},{"value":1099,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kannada","description":"","tags":[],"dependencyGroup":null},{"value":1087,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kazakh","description":"","tags":[],"dependencyGroup":null},{"value":1107,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Khmer","description":"","tags":[],"dependencyGroup":null},{"value":1158,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"K'iche","description":"","tags":[],"dependencyGroup":null},{"value":1159,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kinyarwanda","description":"","tags":[],"dependencyGroup":null},{"value":1088,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kyrgyz","description":"","tags":[],"dependencyGroup":null},{"value":1089,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Swahili","description":"","tags":[],"dependencyGroup":null},{"value":1111,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Konkani","description":"","tags":[],"dependencyGroup":null},{"value":1042,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Korean","description":"","tags":[],"dependencyGroup":null},{"value":1062,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Latvian","description":"","tags":[],"dependencyGroup":null},{"value":1063,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Lithuanian","description":"","tags":[],"dependencyGroup":null},{"value":1134,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Luxembourgish","description":"","tags":[],"dependencyGroup":null},{"value":1086,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Malay (Malaysia)","description":"","tags":[],"dependencyGroup":null},{"value":1100,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Malayalam","description":"","tags":[],"dependencyGroup":null},{"value":1082,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Maltese","description":"","tags":[],"dependencyGroup":null},{"value":1153,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Maori","description":"","tags":[],"dependencyGroup":null},{"value":1102,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Marathi","description":"","tags":[],"dependencyGroup":null},{"value":1071,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Macedonian","description":"","tags":[],"dependencyGroup":null},{"value":1104,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Mongolian (Cyrillic)","description":"","tags":[],"dependencyGroup":null},{"value":1121,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Nepali","description":"","tags":[],"dependencyGroup":null},{"value":1044,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Norwegian (Bokmal)","description":"","tags":[],"dependencyGroup":null},{"value":2068,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Norwegian (Nynorsk)","description":"","tags":[],"dependencyGroup":null},{"value":1096,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Odia","description":"","tags":[],"dependencyGroup":null},{"value":1065,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Persian","description":"","tags":[],"dependencyGroup":null},{"value":1045,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Polish","description":"","tags":[],"dependencyGroup":null},{"value":1046,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Portuguese (Brazil)","description":"","tags":[],"dependencyGroup":null},{"value":2070,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Portuguese (Portugal)","description":"","tags":[],"dependencyGroup":null},{"value":1094,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Punjabi","description":"","tags":[],"dependencyGroup":null},{"value":2118,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Punjabi (Pakistan)","description":"","tags":[],"dependencyGroup":null},{"value":3179,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Quechua (Peru)","description":"","tags":[],"dependencyGroup":null},{"value":1048,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Romanian","description":"","tags":[],"dependencyGroup":null},{"value":1049,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Russian","description":"","tags":[],"dependencyGroup":null},{"value":1169,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Scottish Gaelic (United Kingdom)","description":"","tags":[],"dependencyGroup":null},{"value":3098,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Serbian (Cyrillic, Serbia and Montenegro (Former))","description":"","tags":[],"dependencyGroup":null},{"value":7194,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Serbian (Cyrillic, Bosnia and Herzegovina)","description":"","tags":[],"dependencyGroup":null},{"value":2074,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Serbian (Latin, Serbia and Montenegro (Former))","description":"","tags":[],"dependencyGroup":null},{"value":1132,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sesotho sa Leboa","description":"","tags":[],"dependencyGroup":null},{"value":1074,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Setswana","description":"","tags":[],"dependencyGroup":null},{"value":2137,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sindhi (Arabic)","description":"","tags":[],"dependencyGroup":null},{"value":1115,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sinhala","description":"","tags":[],"dependencyGroup":null},{"value":1051,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Slovak","description":"","tags":[],"dependencyGroup":null},{"value":1060,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Slovenian","description":"","tags":[],"dependencyGroup":null},{"value":3082,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish","description":"","tags":[],"dependencyGroup":null},{"value":1053,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Swedish","description":"","tags":[],"dependencyGroup":null},{"value":1064,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tajik","description":"","tags":[],"dependencyGroup":null},{"value":1097,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tamil","description":"","tags":[],"dependencyGroup":null},{"value":1092,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tatar","description":"","tags":[],"dependencyGroup":null},{"value":1098,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Telugu","description":"","tags":[],"dependencyGroup":null},{"value":1054,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Thai","description":"","tags":[],"dependencyGroup":null},{"value":1139,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tigrinya (Ethiopia)","description":"","tags":[],"dependencyGroup":null},{"value":1055,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Turkish","description":"","tags":[],"dependencyGroup":null},{"value":1090,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Turkmen","description":"","tags":[],"dependencyGroup":null},{"value":1058,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Ukrainian","description":"","tags":[],"dependencyGroup":null},{"value":1056,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Urdu","description":"","tags":[],"dependencyGroup":null},{"value":1152,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Uyghur (China)","description":"","tags":[],"dependencyGroup":null},{"value":1091,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Uzbek (Latin)","description":"","tags":[],"dependencyGroup":null},{"value":2051,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Valencian","description":"","tags":[],"dependencyGroup":null},{"value":1066,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Vietnamese","description":"","tags":[],"dependencyGroup":null},{"value":1106,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Welsh","description":"","tags":[],"dependencyGroup":null},{"value":1160,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Wolof","description":"","tags":[],"dependencyGroup":null},{"value":1130,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yoruba","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the display language of the user interface for all Office 2016 programs.  In addition to configuring this setting, consider enabling the same language in the 'Enabled Editing Languages' policy node.","supportedPlatforms":["Windows"],"tags":["Display Language","Language Preferences","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources","registrySubPath":"uilanguage","registryType":"REG_DWORD","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources","registrySubPath":"followsystemui","enforcedValues":{"(same as the system)":"ExplicitOn","afrikaans":"ExplicitOff","albanian":"ExplicitOff","amharic":"ExplicitOff","arabic":"ExplicitOff","armenian":"ExplicitOff","assamese":"ExplicitOff","azerbaijani (Latin)":"ExplicitOff","bangla (Bangladesh)":"ExplicitOff","bangla (India)":"ExplicitOff","basque":"ExplicitOff","belarusian":"ExplicitOff","bosnian (Latin)":"ExplicitOff","bulgarian":"ExplicitOff","catalan":"ExplicitOff","central Kurdish (Iraq)":"ExplicitOff","cherokee":"ExplicitOff","chinese (Simplified)":"ExplicitOff","chinese (Traditional)":"ExplicitOff","croatian":"ExplicitOff","czech":"ExplicitOff","danish":"ExplicitOff","dari":"ExplicitOff","dutch":"ExplicitOff","english":"ExplicitOff","estonian":"ExplicitOff","filipino":"ExplicitOff","finnish":"ExplicitOff","french":"ExplicitOff","galician":"ExplicitOff","georgian":"ExplicitOff","german":"ExplicitOff","greek":"ExplicitOff","gujarati":"ExplicitOff","hausa (Latin)":"ExplicitOff","hebrew":"ExplicitOff","hindi":"ExplicitOff","hungarian":"ExplicitOff","icelandic":"ExplicitOff","igbo":"ExplicitOff","indonesian":"ExplicitOff","inuktitut (Latin)":"ExplicitOff","irish":"ExplicitOff","isiXhosa":"ExplicitOff","isiZulu":"ExplicitOff","italian":"ExplicitOff","japanese":"ExplicitOff","kannada":"ExplicitOff","kazakh":"ExplicitOff","khmer":"ExplicitOff","k'iche":"ExplicitOff","kinyarwanda":"ExplicitOff","kyrgyz":"ExplicitOff","swahili":"ExplicitOff","konkani":"ExplicitOff","korean":"ExplicitOff","latvian":"ExplicitOff","lithuanian":"ExplicitOff","luxembourgish":"ExplicitOff","malay (Malaysia)":"ExplicitOff","malayalam":"ExplicitOff","maltese":"ExplicitOff","maori":"ExplicitOff","marathi":"ExplicitOff","macedonian":"ExplicitOff","mongolian (Cyrillic)":"ExplicitOff","nepali":"ExplicitOff","norwegian (Bokmal)":"ExplicitOff","norwegian (Nynorsk)":"ExplicitOff","odia":"ExplicitOff","persian":"ExplicitOff","polish":"ExplicitOff","portuguese (Brazil)":"ExplicitOff","portuguese (Portugal)":"ExplicitOff","punjabi":"ExplicitOff","punjabi (Pakistan)":"ExplicitOff","quechua (Peru)":"ExplicitOff","romanian":"ExplicitOff","russian":"ExplicitOff","scottish Gaelic (United Kingdom)":"ExplicitOff","serbian (Cyrillic, Serbia and Montenegro (Former))":"ExplicitOff","serbian (Cyrillic, Bosnia and Herzegovina)":"ExplicitOff","serbian (Latin, Serbia and Montenegro (Former))":"ExplicitOff","sesotho sa Leboa":"ExplicitOff","setswana":"ExplicitOff","sindhi (Arabic)":"ExplicitOff","sinhala":"ExplicitOff","slovak":"ExplicitOff","slovenian":"ExplicitOff","spanish":"ExplicitOff","swedish":"ExplicitOff","tajik":"ExplicitOff","tamil":"ExplicitOff","tatar":"ExplicitOff","telugu":"ExplicitOff","thai":"ExplicitOff","tigrinya (Ethiopia)":"ExplicitOff","turkish":"ExplicitOff","turkmen":"ExplicitOff","ukrainian":"ExplicitOff","urdu":"ExplicitOff","uyghur (China)":"ExplicitOff","uzbek (Latin)":"ExplicitOff","valencian":"ExplicitOff","vietnamese":"ExplicitOff","welsh":"ExplicitOff","wolof":"ExplicitOff","yoruba":"ExplicitOff"}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources","registrySubPath":"followsystemuilanguage","enforcedValues":{"(same as the system)":1,"afrikaans":0,"albanian":0,"amharic":0,"arabic":0,"armenian":0,"assamese":0,"azerbaijani (Latin)":0,"bangla (Bangladesh)":0,"bangla (India)":0,"basque":0,"belarusian":0,"bosnian (Latin)":0,"bulgarian":0,"catalan":0,"central Kurdish (Iraq)":0,"cherokee":0,"chinese (Simplified)":0,"chinese (Traditional)":0,"croatian":0,"czech":0,"danish":0,"dari":0,"dutch":0,"english":0,"estonian":0,"filipino":0,"finnish":0,"french":0,"galician":0,"georgian":0,"german":0,"greek":0,"gujarati":0,"hausa (Latin)":0,"hebrew":0,"hindi":0,"hungarian":0,"icelandic":0,"igbo":0,"indonesian":0,"inuktitut (Latin)":0,"irish":0,"isiXhosa":0,"isiZulu":0,"italian":0,"japanese":0,"kannada":0,"kazakh":0,"khmer":0,"k'iche":0,"kinyarwanda":0,"kyrgyz":0,"swahili":0,"konkani":0,"korean":0,"latvian":0,"lithuanian":0,"luxembourgish":0,"malay (Malaysia)":0,"malayalam":0,"maltese":0,"maori":0,"marathi":0,"macedonian":0,"mongolian (Cyrillic)":0,"nepali":0,"norwegian (Bokmal)":0,"norwegian (Nynorsk)":0,"odia":0,"persian":0,"polish":0,"portuguese (Brazil)":0,"portuguese (Portugal)":0,"punjabi":0,"punjabi (Pakistan)":0,"quechua (Peru)":0,"romanian":0,"russian":0,"scottish Gaelic (United Kingdom)":0,"serbian (Cyrillic, Serbia and Montenegro (Former))":0,"serbian (Cyrillic, Bosnia and Herzegovina)":0,"serbian (Latin, Serbia and Montenegro (Former))":0,"sesotho sa Leboa":0,"setswana":0,"sindhi (Arabic)":0,"sinhala":0,"slovak":0,"slovenian":0,"spanish":0,"swedish":0,"tajik":0,"tamil":0,"tatar":0,"telugu":0,"thai":0,"tigrinya (Ethiopia)":0,"turkish":0,"turkmen":0,"ukrainian":0,"urdu":0,"uyghur (China)":0,"uzbek (Latin)":0,"valencian":0,"vietnamese":0,"welsh":0,"wolof":0,"yoruba":0}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources","registrySubPath":"uilanguagetag","enforcedValues":{"(same as the system)":"x-none","afrikaans":"af-ZA","albanian":"sq-AL","amharic":"am-ET","arabic":"ar-SA","armenian":"hy-AM","assamese":"as-IN","azerbaijani (Latin)":"az-Latn-AZ","bangla (Bangladesh)":"bn-BD","bangla (India)":"bn-IN","basque":"eu-ES","belarusian":"be-BY","bosnian (Latin)":"bs-Latn-BA","bulgarian":"bg-BG","catalan":"ca-ES","central Kurdish (Iraq)":"ku-Arab-IQ","cherokee":"chr-Cher-US","chinese (Simplified)":"zh-CN","chinese (Traditional)":"zh-TW","croatian":"hr-HR","czech":"cs-CZ","danish":"da-DK","dari":"prs-AF","dutch":"nl-NL","english":"en-US","estonian":"et-EE","filipino":"fil-PH","finnish":"fi-FI","french":"fr-FR","galician":"gl-ES","georgian":"ka-GE","german":"de-DE","greek":"el-GR","gujarati":"gu-IN","hausa (Latin)":"ha-Latn-NG","hebrew":"he-IL","hindi":"hi-IN","hungarian":"hu-HU","icelandic":"is-IS","igbo":"ig-NG","indonesian":"id-ID","inuktitut (Latin)":"iu-Latn-CA","irish":"ga-IE","isiXhosa":"xh-ZA","isiZulu":"zu-ZA","italian":"it-IT","japanese":"ja-JP","kannada":"kn-IN","kazakh":"kk-KZ","khmer":"km-KH","k'iche":"quc-Latn-GT","kinyarwanda":"rw-RW","kyrgyz":"ky-KG","swahili":"sw-KE","konkani":"kok-IN","korean":"ko-KR","latvian":"lv-LV","lithuanian":"lt-LT","luxembourgish":"lb-LU","malay (Malaysia)":"ms-MY","malayalam":"ml-IN","maltese":"mt-MT","maori":"mi-NZ","marathi":"mr-IN","macedonian":"mk-MK","mongolian (Cyrillic)":"mn-MN","nepali":"ne-NP","norwegian (Bokmal)":"nb-NO","norwegian (Nynorsk)":"nn-NO","odia":"or-IN","persian":"fa-IR","polish":"pl-PL","portuguese (Brazil)":"pt-BR","portuguese (Portugal)":"pt-PT","punjabi":"pa-IN","punjabi (Pakistan)":"pa-Arab-PK","quechua (Peru)":"quz-PE","romanian":"ro-RO","russian":"ru-RU","scottish Gaelic (United Kingdom)":"gd-GB","serbian (Cyrillic, Serbia and Montenegro (Former))":"sr-Cyrl-CS","serbian (Cyrillic, Bosnia and Herzegovina)":"sr-Cyrl-BA","serbian (Latin, Serbia and Montenegro (Former))":"sr-Latn-CS","sesotho sa Leboa":"nso-ZA","setswana":"tn-ZA","sindhi (Arabic)":"sd-Arab-PK","sinhala":"si-LK","slovak":"sk-SK","slovenian":"sl-SI","spanish":"es-ES","swedish":"sv-SE","tajik":"tg-Cyrl-TJ","tamil":"ta-IN","tatar":"tt-RU","telugu":"te-IN","thai":"th-TH","tigrinya (Ethiopia)":"ti-ET","turkish":"tr-TR","turkmen":"tk-TM","ukrainian":"uk-UA","urdu":"ur-PK","uyghur (China)":"ug-CN","uzbek (Latin)":"uz-Latn-UZ","valencian":"ca-ES-valencia","vietnamese":"vi-VN","welsh":"cy-GB","wolof":"wo-SN","yoruba":"yo-NG"}}]}}},{"id":"office16;L_Divehi","uniqueId":2092,"displayName":"Divehi","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Divehi","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"dv-mv","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DocumentChat","uniqueId":1563,"displayName":"Allow co-authors to chat within a document","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether co-authors can use the chat functionality within an Office application to collaborate with each other when editing a document.\n\nIf you enable or don’t configure this policy setting, users can chat with each other when co-authoring a document.\n\nIf you disable this policy setting, users can’t chat with each other when co-authoring a document.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows","Web","Mac","iOS"],"tags":["Collaboration Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies","AnonymousPolicyAssignment"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"disabledocumentchat","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DocumentInformationpanelBeaconingUI","uniqueId":2536,"displayName":"Document Information Panel Beaconing UI","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_DocumentInformationpanelBeaconingUI;L_empty423","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls whether users see a security warning when they open custom Document Information Panels that contain a Web beaconing threat. InfoPath can be used to create custom Document Information Panels that can be attached to Excel workbooks, PowerPoint presentations, and Word documents. \n\nIf you enable this policy setting, you can choose from three options for controlling when users are prompted about Web beaconing threats: \n\n- Never show UI \n\n- Always show UI \n\n- Show UI if XSN is in Internet Zone \n\nIf you disable or do not configure this policy setting, the behavior is the equivalent of setting the policy to Enabled -- Never show UI.","supportedPlatforms":["Windows"],"tags":["Document Information Panel","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_DocumentInformationpanelBeaconingUI;L_empty423","uniqueId":2535,"displayName":"Document Information Panel Beaconing UI","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Never show UI","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Always show UI","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Show UI if XSN is in Internet Zone","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls whether users see a security warning when they open custom Document Information Panels that contain a Web beaconing threat. InfoPath can be used to create custom Document Information Panels that can be attached to Excel workbooks, PowerPoint presentations, and Word documents. \n\nIf you enable this policy setting, you can choose from three options for controlling when users are prompted about Web beaconing threats: \n\n- Never show UI \n\n- Always show UI \n\n- Show UI if XSN is in Internet Zone \n\nIf you disable or do not configure this policy setting, the behavior is the equivalent of setting the policy to Enabled -- Never show UI.","supportedPlatforms":["Windows"],"tags":["Document Information Panel","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\documentinformationpanel","registrySubPath":"msoridcuxdocspropertypanelbeaconing","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DoNotAllowExpiredCertificatesWhenValidatingSignatures","uniqueId":1714,"displayName":"Do not allow expired certificates when validating signatures","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to configure Office 2016 applications to accept expired digital certificates during verification of digital signatures.\n\nIf you enable or do not configure this policy setting, Office 2016 applications display digital signatures created with expired certificates as invalid.\n\nIf you disable this policy setting, Office 2016 applications treat expired certificates as valid.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"ignoreexpiredcert","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DoNotDisplayHoverMenu","uniqueId":2316,"displayName":"Do not display Hover Menu","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to stop the Hover Menu from displaying when a user hovers over a contact’s presence icon or display name with the mouse cursor.\n\nIf you enable this policy setting, when a user hovers over a contact’s presence icon or display name with the mouse cursor, the Hover Menu will not be displayed.\n\nIf you disable or do not configure this policy setting, the Hover Menu appears when a user hovers over a contact’s presence icon or display name with the mouse cursor.","supportedPlatforms":["Windows"],"tags":["Contact Card","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoffhoverfunctionality","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Donotdisplaypathsinalerts","uniqueId":2716,"displayName":"Do not display paths in alerts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"hidepathinalerts","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DoNotDisplayPhotograph","uniqueId":2318,"displayName":"Do not display photograph","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting lets you specify if the photograph is shown on the contact card, e-mail header, reading pane, fast search results, global address list (GAL) dialog, Backstage, and quick contacts.  \n\nIf you enable this policy setting, photographs are not displayed in the locations listed above.\n\nIf you disable or do not configure this policy setting, photographs appear in the locations listed above.","supportedPlatforms":["Windows"],"tags":["Contact Card","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"turnoffphotograph","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DonotemulatetabswithspaceswhenexportingHTML","uniqueId":2714,"displayName":"Emulate tabs with spaces when exporting HTML","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Enabled: Tabs are emulated by replacing them with spaces when exporting HTML. | Disabled: Tab characters are not replaced with spaces when exporting HTML format.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"exportrealtabs","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DonotpromptuserstoshareExcelworkbookswhensendingforreview","uniqueId":2454,"displayName":"Do not prompt users to share Excel workbooks when sending for review","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Checked: Do not prompt the user to share Excel workbooks when sending them for review. | Unchecked: Prompt the user to share Excel workbooks when sending them for review.","supportedPlatforms":["Windows"],"tags":["Collaboration Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"donotprompttoshare","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_DoNotShowScreenTipsontoolbars","uniqueId":1589,"displayName":"Do not show ScreenTips on toolbars","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to configure the \"Show ScreenTips on Toolbars\" option.\n\nIf you enable this policy setting, ScreenTips will not be shown on toolbars.\n\nIf you disable or do not configure this policy setting, ScreenTips will be shown on toolbars.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars","registrySubPath":"tooltips","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Donottrackdocumenteditingtime","uniqueId":2712,"displayName":"Do not track document editing time","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checked: Do not calculate the total editing time while a document is open. | Unchecked: Track the editing time while a document is open.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"notrack","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Donotuploadmediafiles","uniqueId":2715,"displayName":"Do not upload media files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Disables/Enables uploading of media files.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"donotuploadmedia","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DoNotUseHardwareAcceleration","uniqueId":2606,"displayName":"Do not use hardware graphics acceleration","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to not use hardware graphics acceleration.\n\nIf you enable this policy setting, hardware graphics acceleration will not be used.\n\nIf you disable or do not configure this policy setting hardware graphics acceleration may be used.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\graphics","registrySubPath":"disablehardwareacceleration","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DoNotValidatePrintersBeforeUsingThem","uniqueId":2603,"displayName":"Do not validate printers before using them","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to determine whether Word, PowerPoint, or Excel validates its connection with a printer before attempting to use it in the Print tab in Backstage View.\n\nIf you enable this policy setting, Word, PowerPoint, and Excel do not validate printers before using them. If invalid data is returned from the printer, then Word, PowerPoint, and Excel still attempt to use the data, which can result in the application failing.\n\nIf you disable or do not configure this policy setting, Word, PowerPoint, and Excel validate printers before using them in the Print tab in Backstage View. If validation fails, the printer is disabled.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"validateprinters","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DontAutoSaveInformationExcel","uniqueId":2913,"displayName":"[Deprecated] Don’t AutoSave files in Excel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Important: This policy setting will be removed in a future release and will no longer be supported. Please use the \"Turn off AutoSave by default in Excel\" policy setting instead.\n\nThis policy setting controls whether files can be AutoSaved in the desktop version of Excel after Excel has been updated with new features. By default, Auto Saving files is Enabled.\n\nIf you enable this policy setting files will not be able to be AutoSaved.\n\nIf you disable or don’t configure this policy setting files will be able to be AutoSaved.\n\nNote: There are separate policy settings for Word, Excel, and PowerPoint.","supportedPlatforms":["Windows"],"tags":["AutoSave","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel","registrySubPath":"dontautosave","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DontAutoSaveInformationPowerPoint","uniqueId":2914,"displayName":"[Deprecated] Don’t AutoSave files in PowerPoint","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Important: This policy setting will be removed in a future release and will no longer be supported. Please use the \"Turn off AutoSave by default in PowerPoint\" policy setting instead.\n\nThis policy setting controls whether files can be AutoSaved in the desktop version of PowerPoint after PowerPoint has been updated with new features. By default, Auto Saving files is Enabled.\n\nIf you enable this policy setting files will not be able to be AutoSaved.\n\nIf you disable or don’t configure this policy setting files will be able to be AutoSaved.\n\nNote: There are separate policy settings for Word, Excel, and PowerPoint.","supportedPlatforms":["Windows"],"tags":["AutoSave","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint","registrySubPath":"dontautosave","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DontAutoSaveInformationWord","uniqueId":2915,"displayName":"[Deprecated] Don’t AutoSave files in Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Important: This policy setting will be removed in a future release and will no longer be supported. Please use the \"Turn off AutoSave by default in Word\" policy setting instead.\n\nThis policy setting controls whether files can be AutoSaved in the desktop version of Word after Word has been updated with new features. By default, Auto Saving files is Enabled.\n\nIf you enable this policy setting files will not be able to be AutoSaved.\n\nIf you disable or don’t configure this policy setting files will be able to be AutoSaved.\n\nNote: There are separate policy settings for Word, Excel, and PowerPoint.","supportedPlatforms":["Windows"],"tags":["AutoSave","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word","registrySubPath":"dontautosave","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DontShowWhatsNewInformationExcel","uniqueId":2903,"displayName":"Don’t show the What’s New information for Excel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the What’s New information is shown when a user opens the desktop version of Excel for the first time after Excel has been updated with new features. By default, the What’s New information is shown.\n\nIf you enable this policy setting, the What’s New information isn’t shown. Also, the What’s New button in File > Account is disabled.\n\nIf you disable or don’t configure this policy setting, the What’s New information is shown.\n\nNote: There are separate policy settings for Word, Excel, PowerPoint, Outlook, OneNote, and Visio.","supportedPlatforms":["Windows"],"tags":["What's New","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel","registrySubPath":"dontshowwhatsnew","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DontShowWhatsNewInformationOneNote","uniqueId":2907,"displayName":"Don’t show the What’s New information for OneNote","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the What’s New information is shown when a user opens the desktop version of OneNote for the first time after OneNote has been updated with new features. By default, the What’s New information is shown.\n\nIf you enable this policy setting, the What’s New information isn’t shown. Also, the What’s New button in File > Account is disabled.\n\nIf you disable or don’t configure this policy setting, the What’s New information is shown.\n\nNote: There are separate policy settings for Word, Excel, PowerPoint, Outlook, OneNote, and Visio.","supportedPlatforms":["Windows"],"tags":["What's New","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote","registrySubPath":"dontshowwhatsnew","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DontShowWhatsNewInformationOutlook","uniqueId":2906,"displayName":"Don’t show the What’s New information for Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the What’s New information is shown when a user opens the desktop version of Outlook for the first time after Outlook has been updated with new features. By default, the What’s New information is shown.\n\nIf you enable this policy setting, the What’s New information isn’t shown. Also, the What’s New button in File > Office Account is disabled.\n\nIf you disable or don’t configure this policy setting, the What’s New information is shown.\n\nNote: There are separate policy settings for Word, Excel, PowerPoint, Outlook, OneNote, and Visio.","supportedPlatforms":["Windows"],"tags":["What's New","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook","registrySubPath":"dontshowwhatsnew","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DontShowWhatsNewInformationPowerPoint","uniqueId":2904,"displayName":"Don’t show the What’s New information for PowerPoint","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the What’s New information is shown when a user opens the desktop version of PowerPoint for the first time after PowerPoint has been updated with new features. By default, the What’s New information is shown.\n\nIf you enable this policy setting, the What’s New information isn’t shown. Also, the What’s New button in File > Account is disabled.\n\nIf you disable or don’t configure this policy setting, the What’s New information is shown.\n\nNote: There are separate policy settings for Word, Excel, PowerPoint, Outlook, OneNote, and Visio.","supportedPlatforms":["Windows"],"tags":["What's New","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint","registrySubPath":"dontshowwhatsnew","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DontShowWhatsNewInformationVisio","uniqueId":2905,"displayName":"Don’t show the What’s New information for Visio","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the What’s New information is shown when a user opens the desktop version of Visio for the first time after Visio has been updated with new features. By default, the What’s New information is shown.\n\nIf you enable this policy setting, the What’s New information isn’t shown. Also, the What’s New button in File > Account is disabled.\n\nIf you disable or don’t configure this policy setting, the What’s New information is shown.\n\nNote: There are separate policy settings for Word, Excel, PowerPoint, Outlook, OneNote, and Visio.","supportedPlatforms":["Windows"],"tags":["What's New","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio","registrySubPath":"dontshowwhatsnew","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DontShowWhatsNewInformationWord","uniqueId":2908,"displayName":"Don’t show the What’s New information for Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the What’s New information is shown when a user opens the desktop version of Word for the first time after Word has been updated with new features. By default, the What’s New information is shown.\n\nIf you enable this policy setting, the What’s New information isn’t shown. Also, the What’s New button in File > Account is disabled.\n\nIf you disable or don’t configure this policy setting, the What’s New information is shown.\n\nNote: There are separate policy settings for Word, Excel, PowerPoint, Outlook, OneNote, and Visio.","supportedPlatforms":["Windows"],"tags":["What's New","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word","registrySubPath":"dontshowwhatsnew","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DutchBelgium","uniqueId":2093,"displayName":"Dutch (Belgium)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Dutch (Belgium)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"nl-be","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_DutchNetherlands","uniqueId":2094,"displayName":"Dutch (Netherlands)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Dutch (Netherlands)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"nl-nl","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Edo","uniqueId":2095,"displayName":"Edo","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Edo","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"bin-ng","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EKUfiltering","uniqueId":2504,"displayName":"EKU filtering","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EKUfiltering;L_empty412","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify enhanced key usage (EKU) values to be used in filtering a list of digital certificates for signing Excel, PowerPoint, and Word documents. An enhanced key usage (EKU) extension to a digital certificate is a collection of one or more values that indicate how a certificate should be used. Examples of EKU values include Smart Card Logon and Client Authentication. EKU filtering allows you to filter the list of installed certificates that can be used for digitally signing documents. The filtered list will appear when users attempt to select a certificate for digitally signing a document. \n\nIf you enable this policy setting, you can specify a list of object identifiers (OIDs) that represent acceptable EKUs for certificates used in conjunction with signed documents. For example, for a certificate with the Encrypting File System (1.3.6.1.4.1.311.10.3.4) identifier, the OID is 1.3.6.1.4.1.311.10.3.4. This list of appropriate OIDs will vary according to the specific certificates that the organization uses.  For a list of object IDs associated with Microsoft cryptography, see Microsoft Knowledge Base article 287547, \"Object IDs associated with Microsoft cryptography\" at http://officeredir.microsoft.com/r/rlidGPOIDAndCrypt2O14?clid=1033. \n\nIf you disable or do not configure this policy setting, EKU filtering is not available.","supportedPlatforms":["Windows"],"tags":["Signing","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EKUfiltering;L_empty412","uniqueId":2503,"displayName":"EKU filtering","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify enhanced key usage (EKU) values to be used in filtering a list of digital certificates for signing Excel, PowerPoint, and Word documents. An enhanced key usage (EKU) extension to a digital certificate is a collection of one or more values that indicate how a certificate should be used. Examples of EKU values include Smart Card Logon and Client Authentication. EKU filtering allows you to filter the list of installed certificates that can be used for digitally signing documents. The filtered list will appear when users attempt to select a certificate for digitally signing a document. \n\nIf you enable this policy setting, you can specify a list of object identifiers (OIDs) that represent acceptable EKUs for certificates used in conjunction with signed documents. For example, for a certificate with the Encrypting File System (1.3.6.1.4.1.311.10.3.4) identifier, the OID is 1.3.6.1.4.1.311.10.3.4. This list of appropriate OIDs will vary according to the specific certificates that the organization uses.  For a list of object IDs associated with Microsoft cryptography, see Microsoft Knowledge Base article 287547, \"Object IDs associated with Microsoft cryptography\" at http://officeredir.microsoft.com/r/rlidGPOIDAndCrypt2O14?clid=1033. \n\nIf you disable or do not configure this policy setting, EKU filtering is not available.","supportedPlatforms":["Windows"],"tags":["Signing","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"filterdigitalsignaturecerteku","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EmailCollection","uniqueId":2875,"displayName":"Allow Microsoft to follow up on feedback submitted by users​","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Microsoft can follow up on feedback submitted by users to help understand the feedback, troubleshoot an issue submitted through feedback, or share back how Microsoft used the feedback to improve the product. It also allows the user to remain updated on the status of their feedback. By default, Microsoft may follow up with your users on feedback submitted by them.​\nMicrosoft may send transactional emails or request follow-up conversations via email, voice, or other means related to the feedback or survey response. In some circumstances, Microsoft may ask for additional information to assist with troubleshooting.​\nIf you enable or don’t configure this policy setting, Microsoft may follow up with your users on feedback submitted by them. Users can opt out of communications if they do not want to be contacted about their feedback.​\nIf you disable this policy setting, Microsoft will not follow up with your users on feedback submitted by them.​\nYou will be able to view and manage feedback from your organization in the Microsoft 365 admin center.​\nNote: This policy setting has no effect if the \"Allow users to submit feedback to Microsoft\" policy setting or the “Allow users to receive and respond to in-product surveys from Microsoft” policy setting is set to Disabled.​\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.​\nNote: The behavior outlined in this policy will take effect starting on July 21, 2023.​\n\nFor more information, see https://go.microsoft.com/fwlink/?linkid=2142253","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["Trust Center","Privacy","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies","Feedback","AnonymousPolicyAssignment"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\feedback","registrySubPath":"includeemail","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnableAdditionalActionsInExcel","uniqueId":1648,"displayName":"Enable additional actions in Excel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy setting controls whether Excel can provide additional actions for certain words and phrases in a workbook through the right-click menu, and whether users can configure this behavior by checking or unchecking the \"Enable additional actions in the right-click menu\" option under the File tab | Options | Proofing | AutoCorrect Options | Actions tab. If additional actions functionality is turned on, Excel can recognize dates and financial symbols and provide additional actions for them.\n\nIf you enable or do not configure this policy setting, users can configure Excel to provide additional actions. Note: Excel does not provide additional actions until users check the \"Enable additional actions in the right-click menu\" option in the UI.\n\nIf you disable this policy setting, users cannot configure Excel to provide additional actions.","supportedPlatforms":["Windows"],"tags":["Additional Actions","Tools | AutoCorrect Options... (Excel, PowerPoint and Access)","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"recognizesmarttags","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnableCheckoutToDrafts","uniqueId":2926,"displayName":"Save checked-out files to a local folder","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows users to save files checked out from SharePoint, or other document management server products, to a local folder when editing the files.  \n\nBy default, checked-out files are stored in the Office Document Cache. The Office Document Cache allows the same offline editing capabilities as a local folder, but automatically syncs the files when there is Internet connectivity.\n\nNote: It’s not recommended to enable this policy setting unless needed to support existing document management processes.\n\nIf you enable this policy setting, users can specify a local folder to save checked-out files to by going to File > Options > Save > Offline editing options.\n\nIf you disable or don’t configure this policy setting, checked-out files are stored in the Office Document Cache.","supportedPlatforms":["Windows"],"tags":["Microsoft Office Document Cache","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\offline\\options","registrySubPath":"checkouttodraftsenabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnableColleagueImportOutlookAddintowork","uniqueId":2557,"displayName":"Enable Colleague Import Outlook Add-in to work with Microsoft SharePoint Server","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This setting will enable the Colleague Import Outlook Add-in.","supportedPlatforms":["Windows"],"tags":["SharePoint Server","Server Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\portal\\colleagueimport","registrySubPath":"enabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnableCustomerExperienceImprovementProgram","uniqueId":1697,"displayName":"Enable Customer Experience Improvement Program","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can participate in the Microsoft Office Customer Experience Improvement Program to help improve Microsoft Office. When users choose to participate in the Customer Experience Improvement Program (CEIP), Office 2016 applications automatically send information to Microsoft about how the applications are used. This information is combined with other CEIP data to help Microsoft solve problems and to improve the products and features customers use most often. This feature does not collect users' names, addresses, or any other identifying information except the IP address that is used to send the data. \n\nIf you enable this policy setting, users have the opportunity to opt into participation in the CEIP the first time they run an Office application. If your organization has policies that govern the use of external resources such as the CEIP, allowing users to opt in to the program might cause them to violate these policies. \n\nIf you disable this policy setting, Office 2016 users cannot participate in the Customer Experience Improvement Program. \n\nIf you do not configure this policy setting, the behavior is the equivalent of setting the policy to \"Enabled\".","supportedPlatforms":["Windows"],"tags":["Trust Center","Privacy","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"qmenable","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnableLogging","uniqueId":2870,"displayName":"Turn on telemetry data collection","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn on the data collection features in Office that are used by Office Telemetry Dashboard and Office Telemetry Log.\n\nIf you enable this policy setting, Office Telemetry Agent and Office applications will collect telemetry data, which includes Office application usage, most recently used Office documents (including file names) and solutions usage, compatibility issues, and critical errors that occur on the local computers. You can use Office Telemetry Dashboard to view this data remotely, and users can use Office Telemetry Log to view this data on their local computers.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent and Office applications do not generate or collect telemetry data.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm","registrySubPath":"enablelogging","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnableMacroTrustLevel","uniqueId":2932,"displayName":"Enable macro trust levels","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether macro trust levels are enabled, which classifies VBA macros into four security levels based on file location and digital signature status.\n\nIf you enable this policy setting, VBA macros will be classified into the following trust levels with corresponding user experiences:\n\n- Lowest (Most Trusted): Files signed by a trusted publisher, saved to a trusted location, or unsaved files.\n      - User Experience: No Message Bar displayed, macros load normally.\n\n- Lower: Files opened from a connected personal or business OneDrive account, connected SharePoint location, or local OneDrive folders.\n      - User Experience: Yellow Message Bar with Enable Content option.\n\n- Moderate: Files opened from intranet locations, or signed with an extended validation (EV) certificate but not by a trusted publisher.\n      - User Experience: Yellow Message Bar with a Learn More option. This encourages security awareness by requiring additional steps before enabling macros.\n\n- Highest (Least Trusted): All other files.\n      - User Experience: Red Message Bar with macros blocked.\n\nWhen enabled, unsaved files containing macros will display a warning dialog when users attempt to save the file to local disk, informing them that saving locally may block macro execution when the file is reopened.\n\nIf you disable or don't configure this policy setting, macro trust levels are not enabled and the standard macro security behavior applies.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security","registrySubPath":"enablemacrotrustlevel","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnableMinimizeVbaResigning","uniqueId":2944,"displayName":"Enable Minimizing VBA Project Digital Signature Invalidation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to reduce the number of actions in Office that will result in a document's VBA digital signature becoming invalidated.\n\nThe VBA project may be modified in certain ways that change the project storage but that do not invalidate the source code digital signature. With this setting turned off, these actions will lead to the VBA digital signature being invalidated, and the signature dropped on save if the user does not have the private key available to resign.\n\nWith this setting on, we will only perform a resign of the project if the source code signature has changed, and will keep the existing signature in other cases. If the VBA project storage is changed and saved, but the old signature retained under this feature, this can lead to an invalidation of the saved compiled VBA project state. If this happens, the VBA project will be forced to recompile each time the document is loaded. This may have negative performance impacts for larger VBA projects. Once a document is in this state, the state will persist until the VBA project is resigned.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies","VBA"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\vba\\security","registrySubPath":"minimizevbaresign","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnableMSGraphasDefaultChart","uniqueId":2310,"displayName":"Enable MS Graph as Default Chart Tool in PowerPoint and Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Enables administrators to set the default chart creation tool to MS Graph instead of the default Excel Chart in PowerPoint and Word. Also blocks conversion of Graph charts to Office charts.","supportedPlatforms":["Windows"],"tags":["Graph settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\charting","registrySubPath":"msgraphenable","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnableWorkflowsonMysite","uniqueId":2702,"displayName":"Enable Workflows on My Site","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Allows workflows on My Site to be started from within the workflow enabled Office applications.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\home","registrySubPath":"usemysite","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EncryptDocumentProperties","uniqueId":1706,"displayName":"Encrypt document properties","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you configure if the document properties are encrypted.  This applies to OLE documents (Office 97-2003 compatible) if the application is configured for CAPI RC4.\n\nIf you enable this policy setting, the document properties will be encrypted.\n\nIf you disable or do not configure this policy setting, the document properties will not be encrypted.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security","registrySubPath":"encryptdocprops","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Encryptiontypeforirm","uniqueId":2005,"displayName":"Encryption mode for Information Rights Management (IRM)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Encryptiontypeforirm;L_Encryptiontypeforirmcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"If you enable this policy setting, you can choose from two options for controlling the encryption mode that Excel, PowerPoint, Word, Visio, and Outlook applications use to protect content with Information Rights Management (IRM):\n\n- Electronic Codebook (ECB) – ECB mode is always used when applying IRM encryption.\n- Cipher Block Chaining (CBC) – CBC mode is always used when applying IRM encryption.\n\nIf you disable or don't configure this policy setting:\n\n- For Microsoft 365 Apps (Version 2304 or later): Cipher Block Chaining (CBC) mode is used.\n- For earlier Microsoft 365 Apps and Office LTSC 2021, 2019, and 2016: Electronic Codebook (ECB) mode is used.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Encryptiontypeforirm;L_Encryptiontypeforirmcolon","uniqueId":2004,"displayName":"Encryption mode for IRM:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cipher Block Chaining (CBC)","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Electronic Codebook (ECB)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":1,"description":"If you enable this policy setting, you can choose from two options for controlling the encryption mode that Excel, PowerPoint, Word, Visio, and Outlook applications use to protect content with Information Rights Management (IRM):\n\n- Electronic Codebook (ECB) – ECB mode is always used when applying IRM encryption.\n- Cipher Block Chaining (CBC) – CBC mode is always used when applying IRM encryption.\n\nIf you disable or don't configure this policy setting:\n\n- For Microsoft 365 Apps (Version 2304 or later): Cipher Block Chaining (CBC) mode is used.\n- For earlier Microsoft 365 Apps and Office LTSC 2021, 2019, and 2016: Electronic Codebook (ECB) mode is used.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\drm","registrySubPath":"compatibleencryption","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Encryptiontypeforpasswordprotectedoffice972003;L_encryptiontypecolon318","uniqueId":2002,"displayName":"Encryption type:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"recommendedValues":[{"value":"Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256","recommendation":"security"}],"description":"This policy setting enables you to specify an encryption type for password-protected Office 97-2003 files.\n      \nIf you enable this policy setting, you can specify the type of encryption that Office applications will use to encrypt password-protected files in the older Office 97-2003 file formats. The chosen encryption type must have a corresponding cryptographic service provider (CSP) installed on the computer that encrypts the file.  See the HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Cryptography\\Defaults\\Provider\\ registry key for a list of CSPs installed on the local computer. Specify the encryption type to use by entering it in the provided text box in the following form:\n\n<Encryption Provider>,<Encryption Algorithm>,<Encryption Key Length>.\nFor example, Microsoft Enhanced Cryptographic Provider v1.0,RC4,128\n\nIf you do not configure this policy setting, Excel, PowerPoint, and Word use Office 97/2000 Compatible encryption, a proprietary encryption method, to encrypt password-protected Office 97-2003 files.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security","registrySubPath":"defaultencryption12","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_Encryptiontypeforpasswordprotectedoffice972003","uniqueId":2003,"displayName":"Encryption type for password protected Office 97-2003 files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Encryptiontypeforpasswordprotectedoffice972003;L_encryptiontypecolon318","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting enables you to specify an encryption type for password-protected Office 97-2003 files.\n      \nIf you enable this policy setting, you can specify the type of encryption that Office applications will use to encrypt password-protected files in the older Office 97-2003 file formats. The chosen encryption type must have a corresponding cryptographic service provider (CSP) installed on the computer that encrypts the file.  See the HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Cryptography\\Defaults\\Provider\\ registry key for a list of CSPs installed on the local computer. Specify the encryption type to use by entering it in the provided text box in the following form:\n\n<Encryption Provider>,<Encryption Algorithm>,<Encryption Key Length>.\nFor example, Microsoft Enhanced Cryptographic Provider v1.0,RC4,128\n\nIf you do not configure this policy setting, Excel, PowerPoint, and Word use Office 97/2000 Compatible encryption, a proprietary encryption method, to encrypt password-protected Office 97-2003 files.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Encryptiontypeforpasswordprotectedofficeopen;L_Encryptiontypecolon","uniqueId":2000,"displayName":"Encryption type:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"recommendedValues":[{"value":"Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256","recommendation":"security"}],"description":"This policy setting allows you to specify an encryption type for Office Open XML files.\n      \nIf you enable this policy setting, you can specify the type of encryption that Office applications use to encrypt password-protected files in the Office Open XML file formats used by Excel, PowerPoint, and Word. The chosen encryption type must have a corresponding cryptographic service provider (CSP) installed on the computer that encrypts the file.  See the HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Cryptography\\Defaults\\Provider\\ registry key for a list of CSPs installed on the local computer. Specify the encryption type to use by entering it in the provided text box in the following form:\n\n<Encryption Provider>,<Encryption Algorithm>,<Encryption Key Length>\n\nFor example: Microsoft Enhanced Cryptographic Provider v1.0,RC4,128\n\nIf you disable or do not configure this policy setting, the default CSP is used.  The default cryptographic service provider (CSP) is Microsoft Enhanced RSA and AES Cryptographic Provider, AES-128, 128-bit.\n\nNote: This policy setting does not take effect unless the registry key  \nHKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\<office application name>\\Security\\Crypto\\CompatMode is set to 0. By default the CompatMode registry key is set to 1.\n","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security","registrySubPath":"openxmlencryption","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_Encryptiontypeforpasswordprotectedofficeopen","uniqueId":2001,"displayName":"Encryption type for password protected Office Open XML files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Encryptiontypeforpasswordprotectedofficeopen;L_Encryptiontypecolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify an encryption type for Office Open XML files.\n      \nIf you enable this policy setting, you can specify the type of encryption that Office applications use to encrypt password-protected files in the Office Open XML file formats used by Excel, PowerPoint, and Word. The chosen encryption type must have a corresponding cryptographic service provider (CSP) installed on the computer that encrypts the file.  See the HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Cryptography\\Defaults\\Provider\\ registry key for a list of CSPs installed on the local computer. Specify the encryption type to use by entering it in the provided text box in the following form:\n\n<Encryption Provider>,<Encryption Algorithm>,<Encryption Key Length>\n\nFor example: Microsoft Enhanced Cryptographic Provider v1.0,RC4,128\n\nIf you disable or do not configure this policy setting, the default CSP is used.  The default cryptographic service provider (CSP) is Microsoft Enhanced RSA and AES Cryptographic Provider, AES-128, 128-bit.\n\nNote: This policy setting does not take effect unless the registry key  \nHKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\<office application name>\\Security\\Crypto\\CompatMode is set to 0. By default the CompatMode registry key is set to 1.\n","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EnforcePDFcompliancewithISO190051PDFA;L_empty417","uniqueId":2510,"displayName":"Enforce PDF compliance with ISO 19005-1 (PDF/A)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Default","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Encourage","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prevent","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enforce","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Allows enforcement of ISO 19005-1 compliance in PDF output. The values for his setting are as follows:\n      \nDefault: Options UI defaults to not ISO compliant. User may override.\n\nEncourage: Options UI defaults to ISO compliance. User may override.\n\nPrevent: Not ISO compliant. No user override.\n\nEnforce: ISO compliant. No user override.\n\nSee Office Help for more details on the tradeoffs of choosing ISO 19005 compliance.","supportedPlatforms":["Windows"],"tags":["Microsoft Save As PDF and XPS add-ins","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\fixedformat","registrySubPath":"useiso19005-1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnforcePDFcompliancewithISO190051PDFA","uniqueId":2511,"displayName":"Enforce PDF compliance with ISO 19005-1 (PDF/A)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EnforcePDFcompliancewithISO190051PDFA;L_empty417","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Allows enforcement of ISO 19005-1 compliance in PDF output. The values for his setting are as follows:\n      \nDefault: Options UI defaults to not ISO compliant. User may override.\n\nEncourage: Options UI defaults to ISO compliance. User may override.\n\nPrevent: Not ISO compliant. No user override.\n\nEnforce: ISO compliant. No user override.\n\nSee Office Help for more details on the tradeoffs of choosing ISO 19005 compliance.","supportedPlatforms":["Windows"],"tags":["Microsoft Save As PDF and XPS add-ins","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EnglishAustralia","uniqueId":2096,"displayName":"English (Australia)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language English (Australia)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"en-au","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnglishBelize","uniqueId":2097,"displayName":"English (Belize)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language English (Belize)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"en-bz","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnglishCanada","uniqueId":2098,"displayName":"English (Canada)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language English (Canada)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"en-ca","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnglishCaribbean","uniqueId":2099,"displayName":"English (Caribbean)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language English (Caribbean)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"en-029","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnglishHongKongSAR","uniqueId":2100,"displayName":"English (Hong Kong S.A.R.)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language English (Hong Kong S.A.R.)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"en-hk","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnglishIndia","uniqueId":2101,"displayName":"English (India)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language English (India)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"en-in","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnglishIndonesia","uniqueId":2102,"displayName":"English (Indonesia)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language English (Indonesia)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"en-id","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnglishIreland","uniqueId":2103,"displayName":"English (Ireland)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language English (Ireland)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"en-ie","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnglishJamaica","uniqueId":2104,"displayName":"English (Jamaica)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language English (Jamaica)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"en-jm","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnglishMalaysia","uniqueId":2105,"displayName":"English (Malaysia)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language English (Malaysia)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"en-my","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnglishNewZealand","uniqueId":2106,"displayName":"English (New Zealand)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language English (New Zealand)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"en-nz","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnglishPhilippines","uniqueId":2107,"displayName":"English (Philippines)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language English (Philippines)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"en-ph","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnglishSingapore","uniqueId":2108,"displayName":"English (Singapore)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language English (Singapore)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"en-sg","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnglishSouthAfrica","uniqueId":2109,"displayName":"English (South Africa)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language English (South Africa)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"en-za","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnglishTrinidadandTobago","uniqueId":2110,"displayName":"English (Trinidad and Tobago)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language English (Trinidad and Tobago)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"en-tt","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnglishUK","uniqueId":2111,"displayName":"English (U.K.)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language English (U.K.)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"en-gb","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnglishUS","uniqueId":2112,"displayName":"English (U.S.)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language English (U.S.)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"en-us","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EnglishZimbabwe","uniqueId":2113,"displayName":"English (Zimbabwe)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language English (Zimbabwe)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"en-zw","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Enterprisetemplatespath","uniqueId":2030,"displayName":"Location of shared custom themes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Enterprisetemplatespath;L_Enterprisetemplatespath329","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a common location for sharing custom Office themes with users in your organization.\n\nA theme contains the following design elements:\n- Fonts\n- Colors\n- Effects\n\nIf you enable this policy, the Themes gallery will list any custom themes that are found in the location that you specify. Only one location is allowed for this policy setting. Logical and UNC paths are supported.\n\nIf you disable or don’t configure this policy, the Themes gallery will not list any custom themes, unless the user has saved one for their personal use.","supportedPlatforms":["Windows"],"tags":["Shared paths","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Enterprisetemplatespath;L_Enterprisetemplatespath329","uniqueId":2029,"displayName":"Location of shared custom themes","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a common location for sharing custom Office themes with users in your organization.\n\nA theme contains the following design elements:\n- Fonts\n- Colors\n- Effects\n\nIf you enable this policy, the Themes gallery will list any custom themes that are found in the location that you specify. Only one location is allowed for this policy setting. Logical and UNC paths are supported.\n\nIf you disable or don’t configure this policy, the Themes gallery will not list any custom themes, unless the user has saved one for their personal use.","supportedPlatforms":["Windows"],"tags":["Shared paths","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"corporatetemplates","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_ErrorsCleanupInterval","uniqueId":2579,"displayName":"Set errors cleanup interval","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ErrorsCleanupInterval;L_ErrorsCleanupIntervalDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the interval for how long failed operations and other error data will remain in the cache before they can be deleted.  Synchronization can fail for any reason.  The failed operations and related instances are marked as \"in error,\" and this data will eventually need to be removed from the cache.  It is recommended that this interval be larger than the regular cleanup interval to give the user opportunities to troubleshoot errors.\n\nIf you enable this policy setting, you may specify the interval (in minutes) for the times the failed operations and error data in the cache are deleted.    \n\nIf you disable or do not configure this policy setting, a default value of 10080 minutes (1 week) will be used.","supportedPlatforms":["Windows"],"tags":["Synchronization","Business Data","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ErrorsCleanupInterval;L_ErrorsCleanupIntervalDecimal","uniqueId":2578,"displayName":"Errors cleanup interval (minutes)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":1000000},"dataType":"Integer"},"description":"This policy setting allows you to specify the interval for how long failed operations and other error data will remain in the cache before they can be deleted.  Synchronization can fail for any reason.  The failed operations and related instances are marked as \"in error,\" and this data will eventually need to be removed from the cache.  It is recommended that this interval be larger than the regular cleanup interval to give the user opportunities to troubleshoot errors.\n\nIf you enable this policy setting, you may specify the interval (in minutes) for the times the failed operations and error data in the cache are deleted.    \n\nIf you disable or do not configure this policy setting, a default value of 10080 minutes (1 week) will be used.","supportedPlatforms":["Windows"],"tags":["Synchronization","Business Data","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\business data\\synchronization","registrySubPath":"errors cleanup interval","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ErrorSeverityLevel","uniqueId":2520,"displayName":"Error Severity Level","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ErrorSeverityLevel;L_errorseveritylevel419","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specify the severity level of errors included in the log file created when loading layouts for SmartArt graphic layouts. Choosing Errors only will result in the smallest possible log file and choosing All will result in the largest log file.","supportedPlatforms":["Windows"],"tags":["Microsoft Office SmartArt","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ErrorSeverityLevel;L_errorseveritylevel419","uniqueId":2519,"displayName":"Error Severity Level","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Errors only","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Level 1 warnings and below","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Level 2 warnings and below","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Level 3 warnings and below","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"All","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Specify the severity level of errors included in the log file created when loading layouts for SmartArt graphic layouts. Choosing Errors only will result in the smallest possible log file and choosing All will result in the largest log file.","supportedPlatforms":["Windows"],"tags":["Microsoft Office SmartArt","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\smartart graphics","registrySubPath":"logfileseveritylevel","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey01;L_CertHashcolon","uniqueId":1857,"displayName":"Certificate Hash:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\crypto\\escrowcerts","registrySubPath":"escrowcert01","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey01","uniqueId":1858,"displayName":"Escrow Key #1","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EscrowKey01;L_CertHashcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EscrowKey02;L_CertHashcolon","uniqueId":1859,"displayName":"Certificate Hash:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\crypto\\escrowcerts","registrySubPath":"escrowcert02","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey02","uniqueId":1860,"displayName":"Escrow Key #2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EscrowKey02;L_CertHashcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EscrowKey03;L_CertHashcolon","uniqueId":1861,"displayName":"Certificate Hash:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\crypto\\escrowcerts","registrySubPath":"escrowcert03","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey03","uniqueId":1862,"displayName":"Escrow Key #3","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EscrowKey03;L_CertHashcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EscrowKey04;L_CertHashcolon","uniqueId":1863,"displayName":"Certificate Hash:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\crypto\\escrowcerts","registrySubPath":"escrowcert04","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey04","uniqueId":1864,"displayName":"Escrow Key #4","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EscrowKey04;L_CertHashcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EscrowKey05;L_CertHashcolon","uniqueId":1865,"displayName":"Certificate Hash:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\crypto\\escrowcerts","registrySubPath":"escrowcert05","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey05","uniqueId":1866,"displayName":"Escrow Key #5","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EscrowKey05;L_CertHashcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EscrowKey06;L_CertHashcolon","uniqueId":1867,"displayName":"Certificate Hash:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\crypto\\escrowcerts","registrySubPath":"escrowcert06","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey06","uniqueId":1868,"displayName":"Escrow Key #6","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EscrowKey06;L_CertHashcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EscrowKey07;L_CertHashcolon","uniqueId":1869,"displayName":"Certificate Hash:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\crypto\\escrowcerts","registrySubPath":"escrowcert07","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey07","uniqueId":1870,"displayName":"Escrow Key #7","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EscrowKey07;L_CertHashcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EscrowKey08;L_CertHashcolon","uniqueId":1871,"displayName":"Certificate Hash:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\crypto\\escrowcerts","registrySubPath":"escrowcert08","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey08","uniqueId":1872,"displayName":"Escrow Key #8","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EscrowKey08;L_CertHashcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EscrowKey09;L_CertHashcolon","uniqueId":1873,"displayName":"Certificate Hash:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\crypto\\escrowcerts","registrySubPath":"escrowcert09","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey09","uniqueId":1874,"displayName":"Escrow Key #9","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EscrowKey09;L_CertHashcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EscrowKey10;L_CertHashcolon","uniqueId":1875,"displayName":"Certificate Hash:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\crypto\\escrowcerts","registrySubPath":"escrowcert10","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey10","uniqueId":1876,"displayName":"Escrow Key #10","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EscrowKey10;L_CertHashcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EscrowKey11;L_CertHashcolon","uniqueId":1877,"displayName":"Certificate Hash:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\crypto\\escrowcerts","registrySubPath":"escrowcert11","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey11","uniqueId":1878,"displayName":"Escrow Key #11","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EscrowKey11;L_CertHashcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EscrowKey12;L_CertHashcolon","uniqueId":1879,"displayName":"Certificate Hash:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\crypto\\escrowcerts","registrySubPath":"escrowcert12","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey12","uniqueId":1880,"displayName":"Escrow Key #12","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EscrowKey12;L_CertHashcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EscrowKey13;L_CertHashcolon","uniqueId":1881,"displayName":"Certificate Hash:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\crypto\\escrowcerts","registrySubPath":"escrowcert13","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey13","uniqueId":1882,"displayName":"Escrow Key #13","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EscrowKey13;L_CertHashcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EscrowKey14;L_CertHashcolon","uniqueId":1883,"displayName":"Certificate Hash:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\crypto\\escrowcerts","registrySubPath":"escrowcert14","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey14","uniqueId":1884,"displayName":"Escrow Key #14","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EscrowKey14;L_CertHashcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EscrowKey15;L_CertHashcolon","uniqueId":1885,"displayName":"Certificate Hash:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\crypto\\escrowcerts","registrySubPath":"escrowcert15","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey15","uniqueId":1886,"displayName":"Escrow Key #15","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EscrowKey15;L_CertHashcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EscrowKey16;L_CertHashcolon","uniqueId":1887,"displayName":"Certificate Hash:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\crypto\\escrowcerts","registrySubPath":"escrowcert16","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey16","uniqueId":1888,"displayName":"Escrow Key #16","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EscrowKey16;L_CertHashcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EscrowKey17;L_CertHashcolon","uniqueId":1889,"displayName":"Certificate Hash:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\crypto\\escrowcerts","registrySubPath":"escrowcert17","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey17","uniqueId":1890,"displayName":"Escrow Key #17","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EscrowKey17;L_CertHashcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EscrowKey18;L_CertHashcolon","uniqueId":1891,"displayName":"Certificate Hash:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\crypto\\escrowcerts","registrySubPath":"escrowcert18","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey18","uniqueId":1892,"displayName":"Escrow Key #18","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EscrowKey18;L_CertHashcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EscrowKey19;L_CertHashcolon","uniqueId":1893,"displayName":"Certificate Hash:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\crypto\\escrowcerts","registrySubPath":"escrowcert19","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey19","uniqueId":1894,"displayName":"Escrow Key #19","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EscrowKey19;L_CertHashcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EscrowKey20;L_CertHashcolon","uniqueId":1895,"displayName":"Certificate Hash:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\crypto\\escrowcerts","registrySubPath":"escrowcert20","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_EscrowKey20","uniqueId":1896,"displayName":"Escrow Key #20","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EscrowKey20;L_CertHashcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a certificate to use as an escrow key for password protected files.\n\nIf you enable this policy setting, the certificate you specify is used as an escrow key for all password protected files that are created on this machine.\n\nIf you disable or do not configure this policy setting, an escrow key is not configured.","supportedPlatforms":["Windows"],"tags":["Escrow Certificates","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Estonian","uniqueId":2114,"displayName":"Estonian","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Estonian","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"et-ee","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_EvictServerVersionsPolicy","uniqueId":2900,"displayName":"Age out the locally cached copies of server document versions that are more than n days old","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_EvictServerVersionsPolicy;L_EvictServerVersionsPolicyDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\n        This policy controls when locally cached Office version documents from the server are aged out of the local cache.\n\n        If you enable this policy setting, Office document versions from the server that have been locally cached for more than n days, will be deleted from the local cache.\n\n        If you disable or don't configure this policy setting, Office document versions from the server that have been locally cached, will be deleted from the local cache if older than the default of one day.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_EvictServerVersionsPolicy;L_EvictServerVersionsPolicyDecimal","uniqueId":2899,"displayName":"Number of days","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":14},"dataType":"Integer"},"description":"\n        This policy controls when locally cached Office version documents from the server are aged out of the local cache.\n\n        If you enable this policy setting, Office document versions from the server that have been locally cached for more than n days, will be deleted from the local cache.\n\n        If you disable or don't configure this policy setting, Office document versions from the server that have been locally cached, will be deleted from the local cache if older than the default of one day.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\fileio","registrySubPath":"evictserverversionspolicy","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Faeroese","uniqueId":2115,"displayName":"Faeroese","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Faeroese","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"fo-fo","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_federatedSearchForHelp","uniqueId":2890,"displayName":"Federated search for help","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to determine the sources of content that Office users in your organization can access through Office Help (F1).\n\n          If you enable or do not configure this policy setting, users who utilize Office Help see content from both Office and the Internet.\n\n          If you disable this setting, Office users’ search results through Help are limited to Office content.\n      ","supportedPlatforms":["Windows"],"tags":["Help","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\helpviewer","registrySubPath":"enablefederatedhelpsearch","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FeedbackOptionsDefaults","uniqueId":5347,"displayName":"Set default options for feedback being submitted to Microsoft","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_FeedbackOptionsDefaults;L_FeedbackOptionsDefaultsEmail","logicalOperator":"exists","values":[]},{"dependee":"office16;L_FeedbackOptionsDefaults;L_FeedbackOptionsDefaultsContentSamples","logicalOperator":"exists","values":[]},{"dependee":"office16;L_FeedbackOptionsDefaults;L_FeedbackOptionsDefaultsScreenshot","logicalOperator":"exists","values":[]}],"logicalOperator":1}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls what default options can be pre-selected within the feedback form when users submit feedback to Microsoft.\n\nIf you enable this policy, settings within this policy will affect the feedback experience within the applications. Microsoft uses this data to debug and resolve problems that may be challenging or impossible to resolve without this additional information. User feedback goes directly to our engineers and helps us shape the future of Microsoft products and services for all our users. Microsoft will use this information to improve product experiences for users, including by improving the quality of AI-generated responses and troubleshooting product issues. Users choose whether or not this data is submitted to Microsoft.\n\nIf you disable or don’t configure this policy, settings within this policy will not affect feedback experiences within the applications. By default, this policy will not affect feedback experiences within the applications. You can configure the settings within this policy to control the default behaviors on the feedback form.\n\nThe EmailDefault setting controls whether users are automatically opted in to receive follow-up communication about their feedback from Microsoft. By default, users are not automatically opted in to receive follow communication from Microsoft. If this setting is set to On, users will be automatically opted in to receive follow-up communication about their feedback to Microsoft. Users can manage communication settings via the feedback portal.\n\nThe ContentSampleDefault setting controls whether users are automatically opted in to submit relevant content samples and additional log files with feedback submitted to Microsoft. By default, users are not automatically opted in to submit relevant content samples and additional log files with feedback. If this setting is set to On, users will be automatically opted in to submit relevant content samples and additional log files with feedback submitted to Microsoft with feedback. Users can decide to opt-out.\n\nThe ScreenshotDefault setting controls whether users are automatically opted in to submit screenshots and attachments with feedback submitted to Microsoft. By default users are not automatically opted in to submit screenshots and attachments with feedback. If this setting is set to On, users will be automatically opted in to submit screenshots and attachments with feedback submitted to Microsoft with feedback. Users can decide to opt-out.\n\nNote: The settings within this policy are dependent on existing feedback policies outlined below.\n\nIf \"Allow users to submit feedback to Microsoft\" or \"Allow users to receive and respond to in-product surveys from Microsoft\" is disabled, this policy setting is ignored.\n\nIf any of the following policies are disabled, the corresponding setting within this policy will be ignored. \"Allow Microsoft to follow up on feedback submitted by users\", \"Allow users to include log files and content samples when feedback is submitted to Microsoft\",  \"Allow users to include screenshots and attachments when they submit feedback to Microsoft\".","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["FeedbackOptionsDefaults","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_FeedbackOptionsDefaults;L_FeedbackOptionsDefaultsContentSamples","uniqueId":5348,"displayName":"Default for content samples","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls what default options can be pre-selected within the feedback form when users submit feedback to Microsoft.\n\nIf you enable this policy, settings within this policy will affect the feedback experience within the applications. Microsoft uses this data to debug and resolve problems that may be challenging or impossible to resolve without this additional information. User feedback goes directly to our engineers and helps us shape the future of Microsoft products and services for all our users. Microsoft will use this information to improve product experiences for users, including by improving the quality of AI-generated responses and troubleshooting product issues. Users choose whether or not this data is submitted to Microsoft.\n\nIf you disable or don’t configure this policy, settings within this policy will not affect feedback experiences within the applications. By default, this policy will not affect feedback experiences within the applications. You can configure the settings within this policy to control the default behaviors on the feedback form.\n\nThe EmailDefault setting controls whether users are automatically opted in to receive follow-up communication about their feedback from Microsoft. By default, users are not automatically opted in to receive follow communication from Microsoft. If this setting is set to On, users will be automatically opted in to receive follow-up communication about their feedback to Microsoft. Users can manage communication settings via the feedback portal.\n\nThe ContentSampleDefault setting controls whether users are automatically opted in to submit relevant content samples and additional log files with feedback submitted to Microsoft. By default, users are not automatically opted in to submit relevant content samples and additional log files with feedback. If this setting is set to On, users will be automatically opted in to submit relevant content samples and additional log files with feedback submitted to Microsoft with feedback. Users can decide to opt-out.\n\nThe ScreenshotDefault setting controls whether users are automatically opted in to submit screenshots and attachments with feedback submitted to Microsoft. By default users are not automatically opted in to submit screenshots and attachments with feedback. If this setting is set to On, users will be automatically opted in to submit screenshots and attachments with feedback submitted to Microsoft with feedback. Users can decide to opt-out.\n\nNote: The settings within this policy are dependent on existing feedback policies outlined below.\n\nIf \"Allow users to submit feedback to Microsoft\" or \"Allow users to receive and respond to in-product surveys from Microsoft\" is disabled, this policy setting is ignored.\n\nIf any of the following policies are disabled, the corresponding setting within this policy will be ignored. \"Allow Microsoft to follow up on feedback submitted by users\", \"Allow users to include log files and content samples when feedback is submitted to Microsoft\",  \"Allow users to include screenshots and attachments when they submit feedback to Microsoft\".","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["General","FeedbackOptionsDefaults","Cloud Policies Enum","Cloud Policies Composite","Cloud Policies","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\feedback","registrySubPath":"ContentSamplesDefault","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FeedbackOptionsDefaults;L_FeedbackOptionsDefaultsEmail","uniqueId":5349,"displayName":"Default for email collection","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls what default options can be pre-selected within the feedback form when users submit feedback to Microsoft.\n\nIf you enable this policy, settings within this policy will affect the feedback experience within the applications. Microsoft uses this data to debug and resolve problems that may be challenging or impossible to resolve without this additional information. User feedback goes directly to our engineers and helps us shape the future of Microsoft products and services for all our users. Microsoft will use this information to improve product experiences for users, including by improving the quality of AI-generated responses and troubleshooting product issues. Users choose whether or not this data is submitted to Microsoft.\n\nIf you disable or don’t configure this policy, settings within this policy will not affect feedback experiences within the applications. By default, this policy will not affect feedback experiences within the applications. You can configure the settings within this policy to control the default behaviors on the feedback form.\n\nThe EmailDefault setting controls whether users are automatically opted in to receive follow-up communication about their feedback from Microsoft. By default, users are not automatically opted in to receive follow communication from Microsoft. If this setting is set to On, users will be automatically opted in to receive follow-up communication about their feedback to Microsoft. Users can manage communication settings via the feedback portal.\n\nThe ContentSampleDefault setting controls whether users are automatically opted in to submit relevant content samples and additional log files with feedback submitted to Microsoft. By default, users are not automatically opted in to submit relevant content samples and additional log files with feedback. If this setting is set to On, users will be automatically opted in to submit relevant content samples and additional log files with feedback submitted to Microsoft with feedback. Users can decide to opt-out.\n\nThe ScreenshotDefault setting controls whether users are automatically opted in to submit screenshots and attachments with feedback submitted to Microsoft. By default users are not automatically opted in to submit screenshots and attachments with feedback. If this setting is set to On, users will be automatically opted in to submit screenshots and attachments with feedback submitted to Microsoft with feedback. Users can decide to opt-out.\n\nNote: The settings within this policy are dependent on existing feedback policies outlined below.\n\nIf \"Allow users to submit feedback to Microsoft\" or \"Allow users to receive and respond to in-product surveys from Microsoft\" is disabled, this policy setting is ignored.\n\nIf any of the following policies are disabled, the corresponding setting within this policy will be ignored. \"Allow Microsoft to follow up on feedback submitted by users\", \"Allow users to include log files and content samples when feedback is submitted to Microsoft\",  \"Allow users to include screenshots and attachments when they submit feedback to Microsoft\".","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["General","FeedbackOptionsDefaults","Cloud Policies Enum","Cloud Policies Composite","Cloud Policies","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\feedback","registrySubPath":"EmailDefault","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FeedbackOptionsDefaults;L_FeedbackOptionsDefaultsScreenshot","uniqueId":5350,"displayName":"Default for screenshots","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls what default options can be pre-selected within the feedback form when users submit feedback to Microsoft.\n\nIf you enable this policy, settings within this policy will affect the feedback experience within the applications. Microsoft uses this data to debug and resolve problems that may be challenging or impossible to resolve without this additional information. User feedback goes directly to our engineers and helps us shape the future of Microsoft products and services for all our users. Microsoft will use this information to improve product experiences for users, including by improving the quality of AI-generated responses and troubleshooting product issues. Users choose whether or not this data is submitted to Microsoft.\n\nIf you disable or don’t configure this policy, settings within this policy will not affect feedback experiences within the applications. By default, this policy will not affect feedback experiences within the applications. You can configure the settings within this policy to control the default behaviors on the feedback form.\n\nThe EmailDefault setting controls whether users are automatically opted in to receive follow-up communication about their feedback from Microsoft. By default, users are not automatically opted in to receive follow communication from Microsoft. If this setting is set to On, users will be automatically opted in to receive follow-up communication about their feedback to Microsoft. Users can manage communication settings via the feedback portal.\n\nThe ContentSampleDefault setting controls whether users are automatically opted in to submit relevant content samples and additional log files with feedback submitted to Microsoft. By default, users are not automatically opted in to submit relevant content samples and additional log files with feedback. If this setting is set to On, users will be automatically opted in to submit relevant content samples and additional log files with feedback submitted to Microsoft with feedback. Users can decide to opt-out.\n\nThe ScreenshotDefault setting controls whether users are automatically opted in to submit screenshots and attachments with feedback submitted to Microsoft. By default users are not automatically opted in to submit screenshots and attachments with feedback. If this setting is set to On, users will be automatically opted in to submit screenshots and attachments with feedback submitted to Microsoft with feedback. Users can decide to opt-out.\n\nNote: The settings within this policy are dependent on existing feedback policies outlined below.\n\nIf \"Allow users to submit feedback to Microsoft\" or \"Allow users to receive and respond to in-product surveys from Microsoft\" is disabled, this policy setting is ignored.\n\nIf any of the following policies are disabled, the corresponding setting within this policy will be ignored. \"Allow Microsoft to follow up on feedback submitted by users\", \"Allow users to include log files and content samples when feedback is submitted to Microsoft\",  \"Allow users to include screenshots and attachments when they submit feedback to Microsoft\".","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["General","FeedbackOptionsDefaults","Cloud Policies Enum","Cloud Policies Composite","Cloud Policies","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\feedback","registrySubPath":"ScreenshotDefault","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Filipino","uniqueId":2116,"displayName":"Filipino","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Filipino","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"fil-ph","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Finnish","uniqueId":2117,"displayName":"Finnish","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Finnish","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"fi-fi","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FlagRepeatedWords","uniqueId":1681,"displayName":"Flag Repeated Words","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Allows users to flag or ignore repeated words.","supportedPlatforms":["Windows"],"tags":["Tools | Options | Spelling","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\shared tools\\proofing tools\\1.0\\office","registrySubPath":"flagrepeatedword","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FoldernameforPublishedLinks;L_empty427","uniqueId":2549,"displayName":"Folder name for Published Links","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The folder name used to store network folder shortcuts published from SharePoint Server.  \"My SharePoints\" (localized) by default.","supportedPlatforms":["Windows"],"tags":["Server Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\portal","registrySubPath":"linkpublishingfoldername","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_FoldernameforPublishedLinks","uniqueId":2550,"displayName":"Folder name for Published Links","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_FoldernameforPublishedLinks;L_empty427","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The folder name used to store network folder shortcuts published from SharePoint Server.  \"My SharePoints\" (localized) by default.","supportedPlatforms":["Windows"],"tags":["Server Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ForceRuntimeAVScan","uniqueId":2952,"displayName":"Force Runtime AV Scan","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.​ \n\nThis policy setting controls when Office files are scanned at runtime by an installed Anti-Virus software.\n\nNote, files will only be scanned if the Anti-Virus software registers as a provider for runtime scanning.\n\nIf you enable this policy setting, Office applications will submit all files for a runtime scan by Antivirus.\n\nIf you disable or do not configure this policy setting, Office will selectively submit certain files, for example encrypted files, for a runtime scan by Antivirus.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\security","registrySubPath":"forceruntimeavscan","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FreezeDry","uniqueId":2709,"displayName":"Enable Smart Resume","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"If Outlook, Word, Excel, or PowerPoint shuts down unexpectedly and is restarted automatically (for example, by Document Recovery), the user is returned to a visual state similar to the state at shutdown. By default, this setting is enabled.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\restore workspace","registrySubPath":"restoreworkspace","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FrenchBelgium","uniqueId":2118,"displayName":"French (Belgium)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language French (Belgium)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"fr-be","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FrenchCameroon","uniqueId":2119,"displayName":"French (Cameroon)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language French (Cameroon)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"fr-cm","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FrenchCanada","uniqueId":2120,"displayName":"French (Canada)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language French (Canada)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"fr-ca","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FrenchCaribbean","uniqueId":2121,"displayName":"French (Caribbean)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language French (Caribbean)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"fr-029","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FrenchCongoDRC","uniqueId":2122,"displayName":"French (Congo (DRC))","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language French (Congo (DRC))","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"fr-cd","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FrenchCotedIvoire","uniqueId":2123,"displayName":"French (Côte d'Ivoire)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language French (Côte d'Ivoire)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"fr-ci","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FrenchFrance","uniqueId":2124,"displayName":"French (France)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language French (France)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"fr-fr","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FrenchHaiti","uniqueId":2125,"displayName":"French (Haiti)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language French (Haiti)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"fr-ht","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FrenchLuxembourg","uniqueId":2126,"displayName":"French (Luxembourg)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language French (Luxembourg)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"fr-lu","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FrenchMali","uniqueId":2127,"displayName":"French (Mali)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language French (Mali)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"fr-ml","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FrenchMonaco","uniqueId":2128,"displayName":"French (Monaco)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language French (Monaco)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"fr-mc","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FrenchMorocco","uniqueId":2129,"displayName":"French (Morocco)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language French (Morocco)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"fr-ma","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FrenchReunion","uniqueId":2130,"displayName":"French (Reunion)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language French (Reunion)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"fr-re","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FrenchSenegal","uniqueId":2131,"displayName":"French (Senegal)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language French (Senegal)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"fr-sn","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_FrenchSwitzerland","uniqueId":2132,"displayName":"French (Switzerland)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language French (Switzerland)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"fr-ch","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Frequencyforpollingtheservertodownload;L_empty426","uniqueId":2544,"displayName":"Frequency for polling the server to download published links","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":180},"dataType":"Integer"},"description":"Minimum time to wait (in seconds) before polling SharePoint Server to download published links.","supportedPlatforms":["Windows"],"tags":["Server Settings","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\portal","registrySubPath":"linkpublishingfrequency","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Frequencyforpollingtheservertodownload","uniqueId":2545,"displayName":"Frequency for polling the server to download published links","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Frequencyforpollingtheservertodownload;L_empty426","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Minimum time to wait (in seconds) before polling SharePoint Server to download published links.","supportedPlatforms":["Windows"],"tags":["Server Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_FrisianNetherlands","uniqueId":2133,"displayName":"Western Frisian (Netherlands)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Western Frisian (Netherlands)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"fy-nl","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Fulfulde","uniqueId":2134,"displayName":"Fulfulde","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Fulfulde","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ff-ng","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Galician","uniqueId":2136,"displayName":"Galician","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Galician","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"gl-es","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Georgian","uniqueId":2137,"displayName":"Georgian","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Georgian","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ka-ge","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_GermanAustria","uniqueId":2138,"displayName":"German (Austria)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language German (Austria)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"de-at","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_GermanGermany","uniqueId":2139,"displayName":"German (Germany)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language German (Germany)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"de-de","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_GermanLiechtenstein","uniqueId":2140,"displayName":"German (Liechtenstein)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language German (Liechtenstein)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"de-li","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_GermanLuxembourg","uniqueId":2141,"displayName":"German (Luxembourg)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language German (Luxembourg)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"de-lu","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_GermanSwitzerland","uniqueId":2142,"displayName":"German (Switzerland)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language German (Switzerland)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"de-ch","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Graphgallerypath","uniqueId":2313,"displayName":"Graph gallery path","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Graphgallerypath;L_graphgallerypath354","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the path to store user-defined custom charts.","supportedPlatforms":["Windows"],"tags":["Graph settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Graphgallerypath;L_graphgallerypath354","uniqueId":2312,"displayName":"Graph gallery path","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Sets the path to store user-defined custom charts.","supportedPlatforms":["Windows"],"tags":["Graph settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\graph\\options","registrySubPath":"gallerypath","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_GraphicFilterLegacyMode","uniqueId":2605,"displayName":"Graphic filter legacy mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Controls code path used by legacy GIF/PNG/JPEG filters.  The default is to use the GDI+ codecs for these image types.  For a compatibility mode to previous versions of Office which will use the legacy filter code, enable this policy.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\shared tools\\graphics filters","registrySubPath":"legacy mode","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Greek","uniqueId":2143,"displayName":"Greek","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Greek","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"el-gr","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Greenlandic","uniqueId":2144,"displayName":"Greenlandic","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Greenlandic","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"kl-gl","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Guarani","uniqueId":2145,"displayName":"Guarani","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Guarani","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"gn-py","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Gujarati","uniqueId":2146,"displayName":"Gujarati","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Gujarati","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"gu-in","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Hausa","uniqueId":2147,"displayName":"Hausa (Latin)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Hausa (Latin)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ha-latn-ng","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Hawaiian","uniqueId":2148,"displayName":"Hawaiian","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Hawaiian","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"haw-us","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_HebrewIsrael","uniqueId":2149,"displayName":"Hebrew (Israel)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Hebrew (Israel)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"he-il","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Hebrewmode;L_empty238","uniqueId":1691,"displayName":"Hebrew mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Full","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Partial","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Mixed","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Mixed authorized","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Specifies the script to use for checking spelling of Hebrew text. This option is available only if you are using a right-to-left language version of Microsoft Office or have installed Microsoft Office 2016 proofing tools or the Microsoft Office Single Language Pack 2016 for that language, and have enabled support for the language through Microsoft Office 2016 Language Preferences.","supportedPlatforms":["Windows"],"tags":["Tools | Options | Spelling","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"bidi spelling","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Hebrewmode","uniqueId":1692,"displayName":"Hebrew mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Hebrewmode;L_empty238","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the script to use for checking spelling of Hebrew text. This option is available only if you are using a right-to-left language version of Microsoft Office or have installed Microsoft Office 2016 proofing tools or the Microsoft Office Single Language Pack 2016 for that language, and have enabled support for the language through Microsoft Office 2016 Language Preferences.","supportedPlatforms":["Windows"],"tags":["Tools | Options | Spelling","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_HideBuiltinShapePresetStyles","uniqueId":2515,"displayName":"Hide built-in shape style presets","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to specify whether or not to show the the built-in shape preset styles.","supportedPlatforms":["Windows"],"tags":["Disable Items in User Interface","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\options","registrySubPath":"hidebuiltinshapepresetstyles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_HideManageAccountLink","uniqueId":2881,"displayName":"Do not show \"Manage Account\" link for subscription licenses.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether a \"Manage Account\" link is exposed in Account tab of the File menu for subscription licenses.\n\nIf you enable this policy setting, Office does not expose a \"Manage Account\" link for subscription licenses.\n\nIf you disable or do not configure this policy setting, Office exposes a \"Manage Account\" link for subscription licenses.","supportedPlatforms":["Windows"],"tags":["Subscription Activation","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\licensing","registrySubPath":"hidemanageaccountlink","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Hidemissingcomponentdownloadhyperlinks","uniqueId":2596,"displayName":"Hide missing component download hyperlinks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Don't allow the download of missing components but not showing the download hyperlinks for the missing components. Possible missing components are the Microsoft .NET 2.0 framework and Workflow component.","supportedPlatforms":["Windows"],"tags":["Downloading Framework Components","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"disablemissingcomponenthyperlinks","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_HideTheLearnMoreAboutSharePointHyperlink","uniqueId":1533,"displayName":"Hide the Learn more about SharePoint Hyperlink","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to remove the Learn more about SharePoint hyperlink from the Save to SharePoint form in the Backstage view for Word, PowerPoint, Excel, Visio, and Project.\n\nIf you enable this policy setting, the hyperlink will not be displayed.\n\nIf you disable or do not configure this policy setting, the hyperlink will appear for the Save to SharePoint form in the Backstage view when there are no locations listed.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\sharepointintegration","registrySubPath":"hidelearnmorelink","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Hindi","uniqueId":2150,"displayName":"Hindi","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Hindi","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"hi-in","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_HomeWorkflowLibrary","uniqueId":2704,"displayName":"Home Workflow Library","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_HomeWorkflowLibrary;L_path2504","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Allows administrators to make workflows from a specified list or library available within the workflow enabled Office applications.  The value of this key should be the URL to the list or library where the workflows have been made available.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_HomeWorkflowLibrary;L_path2504","uniqueId":2703,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Allows administrators to make workflows from a specified list or library available within the workflow enabled Office applications.  The value of this key should be the URL to the list or library where the workflows have been made available.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\home","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_Hungarian","uniqueId":2151,"displayName":"Hungarian","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Hungarian","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"hu-hu","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Ibibio","uniqueId":2152,"displayName":"Ibibio","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Ibibio","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ibb-ng","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Icelandic","uniqueId":2153,"displayName":"Icelandic","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Icelandic","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"is-is","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Igbo","uniqueId":2154,"displayName":"Igbo","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Igbo","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ig-ng","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_IgnoreInternetandfileaddresses","uniqueId":1684,"displayName":"Ignore Internet and file addresses","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Allow users to ignore URLs and file paths.","supportedPlatforms":["Windows"],"tags":["Tools | Options | Spelling","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\shared tools\\proofing tools\\1.0\\office","registrySubPath":"ignoreinternetfileaddresses","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_IgnorewordsinUPPERCASE","uniqueId":1682,"displayName":"Ignore words in UPPERCASE","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Allow users to ignore words written in UPPERCASE.","supportedPlatforms":["Windows"],"tags":["Tools | Options | Spelling","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies","VBA"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\shared tools\\proofing tools\\1.0\\office","registrySubPath":"ignoreuppercase","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Ignorewordswithnumbers","uniqueId":1683,"displayName":"Ignore words with numbers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Allows users to ignore words with numbers.","supportedPlatforms":["Windows"],"tags":["Tools | Options | Spelling","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies","VBA"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\shared tools\\proofing tools\\1.0\\office","registrySubPath":"ignorewordswithnumbers","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ImproveProofingTools","uniqueId":1695,"displayName":"Improve Proofing Tools","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the Help Improve Proofing Tools feature sends usage data to Microsoft. The Help Improve Proofing Tools feature collects data about use of the Proofing Tools, such as additions to the custom dictionary, and sends it to Microsoft. After about six months, the feature stops sending data to Microsoft and deletes the data collection file from the user's computer. \n\nIf you enable this policy setting, this feature is enabled if users choose to participate in the Customer Experience Improvement Program (CEIP). If your organization has policies that govern the use of external resources such as the CEIP, allowing the use of the Help Improve Proofing Tools feature might cause them to violate these policies. \n\nIf you disable this policy setting, the Help Improve Proofing Tools feature does not collect proofing tool usage information and transmit it to Microsoft. \n\nIf you do not configure this policy setting, the behavior is the equivalent of setting the policy to \"Enabled\".","supportedPlatforms":["Windows"],"tags":["Proofing Data Collection","Tools | Options | Spelling","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\ptwatson","registrySubPath":"ptwoptin","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_IncreaseVisibilityOfAccessibilityCheckerViolations","uniqueId":2700,"displayName":"Increase the visibility of Accessibility Checker violations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_IncreaseVisibilityOfAccessibilityCheckerViolations;L_IncreaseVisibilityOfAccessibilityCheckerViolationsDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls whether a document, workbook, or spreadsheet with accessibility errors will cause a loud warning or error slab in the user interface.\n\nIf you enable this policy setting, you may specify what happens when a document, workbook, or spreadsheet has accessibility errors:\n\n- Accessibility violations do not change Prepare for Distribution loudness (default)\n- Accessibility errors cause the Prepare for Distribution slab to be loud\n- Accessibility errors or warnings cause the Prepare for Distribution slab to be loud\n\nIf you disable or do not configure this policy setting, the Accessibility Checker UI will be presented in its normal state.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_IncreaseVisibilityOfAccessibilityCheckerViolations;L_IncreaseVisibilityOfAccessibilityCheckerViolationsDropID","uniqueId":2699,"displayName":"Increase the visibility of Accessibility Checker violations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Accessibility violations do not change loudness (default)","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Accessibility errors cause slab to be loud","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Accessibility errors or warnings cause slab to be loud","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls whether a document, workbook, or spreadsheet with accessibility errors will cause a loud warning or error slab in the user interface.\n\nIf you enable this policy setting, you may specify what happens when a document, workbook, or spreadsheet has accessibility errors:\n\n- Accessibility violations do not change Prepare for Distribution loudness (default)\n- Accessibility errors cause the Prepare for Distribution slab to be loud\n- Accessibility errors or warnings cause the Prepare for Distribution slab to be loud\n\nIf you disable or do not configure this policy setting, the Accessibility Checker UI will be presented in its normal state.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"acccheckerslabloudness","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Indonesian","uniqueId":2155,"displayName":"Indonesian","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Indonesian","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"id-id","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_InuktitutLatin","uniqueId":2156,"displayName":"Inuktitut (Latin)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Inuktitut (Latin)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"iu-latn-ca","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_InuktitutSyllabics","uniqueId":2157,"displayName":"Inuktitut (Syllabics)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Inuktitut (Syllabics)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"iu-cans-ca","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_IrishIreland","uniqueId":2158,"displayName":"Irish (Ireland)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Irish (Ireland)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ga-ie","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_IsCustomAddinTabDefaultBackstagePlace","uniqueId":2947,"displayName":"Take users to a custom File menu tab","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users are taken to a custom menu tab when they choose the File menu in an Office app, such as Word or PowerPoint. A custom menu tab can be provided by an installed add-in.\n\nBy default, when users choose the File menu, they are taken to one of the File menu tabs provided by Office, such as Home or Info.\n\nIf you enable this policy setting, and an installed add-in provides a custom File menu tab, users will be taken to that custom tab when they choose the File menu.\n\nIf you disable or don’t configure this policy setting, when users choose the File menu, users will be taken to one of the File menu tabs provided by Office, such as Home or Info.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"msoridiscustomaddintabdefaultbackstageplace","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_IsCustomTabDefaultInNewPlace","uniqueId":2943,"displayName":"Show the Custom tab as the default tab when creating a new file","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy settings controls whether the Custom tab shows as the default tab under File > New in Word, Excel, and PowerPoint.\n\nThe Custom tab shows the custom templates that are available.  If there aren’t any custom templates, the Custom tab can’t be shown.\n\nIf you enable this policy setting, users will see the Custom tab as the default tab when creating a new file by going to File > New.\n\nIf you disable or don’t configure this policy setting, users will see the Featured tab as the default tab when creating a new file by going to File > New, unless access to Office-provided templates has been disabled.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"msoridiscustomtabdefaultinnewplace","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_isiXhosa","uniqueId":2160,"displayName":"isiXhosa","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language isiXhosa","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"xh-za","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_isiZulu","uniqueId":2159,"displayName":"isiZulu","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language isiZulu","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"zu-za","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ItalianItaly","uniqueId":2161,"displayName":"Italian (Italy)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Italian (Italy)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"it-it","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ItalianSwitzerland","uniqueId":2162,"displayName":"Italian (Switzerland)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Italian (Switzerland)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"it-ch","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Japanese","uniqueId":2163,"displayName":"Japanese","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Japanese","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ja-jp","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Kannada","uniqueId":2164,"displayName":"Kannada","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Kannada","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"kn-in","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Kanuri","uniqueId":2165,"displayName":"Kanuri","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Kanuri","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"kr-ng","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_KashmiriArabic","uniqueId":2166,"displayName":"Kashmiri (Arabic)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Kashmiri (Arabic)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ks-arab-in","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_KashmiriDevanagari","uniqueId":2167,"displayName":"Kashmiri (Devanagari)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Kashmiri (Devanagari)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ks-deva-in","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Kazakh","uniqueId":2168,"displayName":"Kazakh","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Kazakh","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"kk-kz","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Khmer","uniqueId":2169,"displayName":"Khmer","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Khmer","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"km-kh","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Kiche","uniqueId":2170,"displayName":"K'iche","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language K'iche","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"quc-latn-gt","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Kinyarwanda","uniqueId":2171,"displayName":"Kinyarwanda","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Kinyarwanda","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"rw-rw","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Konkani","uniqueId":2172,"displayName":"Konkani","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Konkani","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"kok-in","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Korean","uniqueId":2173,"displayName":"Korean","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Korean","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ko-kr","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Kyrgyz","uniqueId":2174,"displayName":"Kyrgyz","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Kyrgyz","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ky-kg","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Lao","uniqueId":2175,"displayName":"Lao","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Lao","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"lo-la","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Largeicons","uniqueId":1587,"displayName":"Large icons","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.  This option only applies to CommandBars UI.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars","registrySubPath":"btnsize","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Latin","uniqueId":2176,"displayName":"Latin","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Latin","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"la-latn","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Latvian","uniqueId":2177,"displayName":"Latvian","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Latvian","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"lv-lv","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Legacyformatsignatires","uniqueId":2505,"displayName":"Legacy format signatures","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can apply binary format digital signatures to Office 97-2003 documents. \n\nIf you enable this policy setting, Office 2016 applications use the Office 2003 binary format to apply digital signatures to Office 97-2003 binary documents so that they will be recognized by the Office 2003 release and earlier applications. \n\nIf you disable or do not configure this policy setting, Office 2016 applications use the XML--based XMLDSIG format to attach digital signatures to documents, including Office 97-2003 binary documents. XMLDSIG signatures are not recognized by Office 2003 applications or previous versions. If an Office 2003 user opens an Excel, PowerPoint, or Word binary document with an XMLDSIG signature attached, the signature will be lost.","supportedPlatforms":["Windows"],"tags":["Signing","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"enablecreationofweakxpsignatures","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_LengthADattributecontainingPersonalSiteURL;L_empty425","uniqueId":2542,"displayName":"Length AD Attribute containing Personal Site URL","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":256,"maximum":2048},"dataType":"Integer"},"defaultValue":"2048","description":"The Office client updates the User object in the Active Directory with the URL of the user's personal site. Please enter the length of URL that the attribute can accept. The default is 2048.","supportedPlatforms":["Windows"],"tags":["Server Settings","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\portal","registrySubPath":"adpersonalsitepropertylen","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_LengthADattributecontainingPersonalSiteURL","uniqueId":2543,"displayName":"Length AD Attribute containing Personal Site URL","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_LengthADattributecontainingPersonalSiteURL;L_empty425","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The Office client updates the User object in the Active Directory with the URL of the user's personal site. Please enter the length of URL that the attribute can accept. The default is 2048.","supportedPlatforms":["Windows"],"tags":["Server Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_LimitedFeedback","uniqueId":5351,"displayName":"Allow users to submit limited feedback to Microsoft","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy allows you to control whether your users can provide limited feedback to Microsoft about their product experiences with Microsoft 365 products when the \"Allow users to submit feedback to Microsoft\" policy is disabled. Limited feedback does not contain user content or require additional permissions. It only collects system metadata and EUPI data required for compliance. Microsoft will use this feedback to improve the product for users.\n\nThis policy is dependent upon the \"Allow users to submit feedback to Microsoft\" policy. If that policy is enabled or not configured, this limited feedback policy does not apply. Only if the \"Allow users to submit feedback to Microsoft\" policy is disabled will configurations to this policy apply.\n\nIf you configure this policy to enabled, your users will be able to submit only limited feedback to Microsoft.\n\nIf you configure this policy to \"Limited feedback disabled\", your users will not be able to submit limited feedback to Microsoft.\n\nIf you don’t configure this policy, users will be able to submit limited feedback to Microsoft.\n\nYou can view and manage feedback from your org in the Microsoft 365 admin center.\n\nNote: This data will be considered \"Feedback\" under your Microsoft 365 agreement, including information that would otherwise be considered \"Customer Data\" or \"Personal Data\".\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, Microsoft 365 Copilot, and to subscription versions of Project and Visio.\n\nFor more information, see https://go.microsoft.com/fwlink/?linkid=2142253","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["LimitedFeedback","Cloud Policies Boolean","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\feedback","registrySubPath":"LimitedFeedback","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_LinksOpenRightDefaultSettingIsNative","uniqueId":3059,"displayName":"File links open preference default selection as Desktop App","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls which file links open preference is set as the default for users’ who has not make their selection. For more information about file links handling and open preference in Office, see https://go.microsoft.com/fwlink/?linkid=2277074. User can manually change the default selection anytime.\n\nIf you enabled this policy setting, file open preference in Word, Excel, PowerPoint, and Outlook will be defaulted to open in Desktop App.\n\nIf you disable this policy setting, file open preference in Word, Excel, PowerPoint, and Outlook will be defaulted to open in web browser.\n\nNote: This policy setting only applies to subscription version of Office.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"linksopenrightdefaultsettingisnative","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Listfontnamesintheirfont","uniqueId":1588,"displayName":"List font names in their font","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.  This option only applies to CommandBars UI.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars","registrySubPath":"fontview","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ListofApprovedLocationsPolicy;L_ListofApprovedLocations","uniqueId":1642,"displayName":"List of Approved Locations:","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"Adds locations, such as c:\\Windows or \\\\server\\share, to the list of approved locations for use with Restricted Browsing. When Restricted Browsing is active, the Save As dialog box is restricted such that the user can navigate only to the locations and the children of the locations specified in this list. \n\nTo allow easier access to these approved locations, consider adding them to the Places bar by using the Places Bar Locations setting for the File Open/Save dialog box. If there are no approved locations in the Places bar, the dialog box may not be able to open.\n\nTo activate Restricted Browsing, use the Restricted Browsing/Activate Restricted Browsing setting.  Note: You must set this policy setting first before the \"Activate Restricted Browsing\".","supportedPlatforms":["Windows"],"tags":["Restricted Browsing","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\restrictedbrowse","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_ListofApprovedLocationsPolicy","uniqueId":1643,"displayName":"Approve Locations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ListofApprovedLocationsPolicy;L_ListofApprovedLocations","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Adds locations, such as c:\\Windows or \\\\server\\share, to the list of approved locations for use with Restricted Browsing. When Restricted Browsing is active, the Save As dialog box is restricted such that the user can navigate only to the locations and the children of the locations specified in this list. \n\nTo allow easier access to these approved locations, consider adding them to the Places bar by using the Places Bar Locations setting for the File Open/Save dialog box. If there are no approved locations in the Places bar, the dialog box may not be able to open.\n\nTo activate Restricted Browsing, use the Restricted Browsing/Activate Restricted Browsing setting.  Note: You must set this policy setting first before the \"Activate Restricted Browsing\".","supportedPlatforms":["Windows"],"tags":["Restricted Browsing","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Listoferrormessagestocustomize","uniqueId":2302,"displayName":"List of error messages to customize","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Listoferrormessagestocustomize;L_listoferrormessagestocustomize351","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines a list of custom error messages to activate.","supportedPlatforms":["Windows"],"tags":["Customizable Error Messages","Microsoft Office 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Listoferrormessagestocustomize;L_listoferrormessagestocustomize351","uniqueId":2301,"displayName":"List of error messages to customize","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"Defines a list of custom error messages to activate.","supportedPlatforms":["Windows"],"tags":["Customizable Error Messages","Microsoft Office 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\customizablealerts","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_Lithuanian","uniqueId":2178,"displayName":"Lithuanian","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Lithuanian","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"lt-lt","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_LoadControlsinForms3","uniqueId":2010,"displayName":"Load Controls in Forms3","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_LoadControlsinForms3;L_LoadControlsinForms3colon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to control how ActiveX controls in UserForms should be initialized based upon whether they are Safe For Initialization (SFI) or Unsafefor Initialization (UFI). \n \n ActiveX controls are Component Object Model (COM) objects and have unrestricted access to users' computers. ActiveX controls can access the local file system and change the registry settings of the operating system. If a malicious user repurposes an ActiveX control to take over a user's computer, the effect could be significant. To help improve security, ActiveX developers can mark controls as Safe For Initialization (SFI), which means that the developer states that the controls are safe to open and run and not capable of causing harm to any computers. If a control is not marked SFI, the control could adversely affect a computer--or it's possible the developers did not test the control in all situations and are not sure whether their control might be compromised at some future date.SFI controls run in safe mode, which limits their access to the computer. For example, a worksheet control can both read and write files when it is in unsafe mode, but perhaps only read from files when it is in safe mode. This functionality allows the control to be used in very powerful ways when safety wasn't important, but the control would still be safe for use in a Web page. If a control is not marked as SFI, it is marked Unsafe For Initialization (UFI), which means that it is capable of affecting a user's computer. If UFI ActiveX controls are loaded, they are always loaded in unsafe mode. \n \n If you enable this policy setting, you can choose from four options for loading controls in UserForms: \n \n 1- For a UFI or SFI signed control that supports safe and unsafe mode, load the control in unsafe mode. For an SFI signed control that only supports a safe mode configuration, load the control in safe mode. This option enforces the default configuration. \n \n 2 - Users are prompted to determine how UserForm forms will load. The prompt only displays once per session within an application. When users respond to the prompt, loading continues based on whether the control is UFI or SFI: \n \n - For a UFI signed control, if users respond Yes to the prompt, load the control in unsafe mode. If users respond No, load the control using the default properties. \n \n - For an SFI signed control that supports both safe and unsafe modes, if users respond Yes to the prompt, load the control in unsafe mode. If users respond No, load the control using safe mode. If the SFI control can only support safe mode, load the control in safe mode. This option is the default configuration in the Microsoft Office 2016 release. \n \n 3 - Users are prompted to determine how UserForm forms will load. The prompt only displays once per session within an application. When users respond to the prompt, loading continues based on whether the control is UFI or SFI: \n \n - For a UFI signed control, if users respond Yes to the prompt, load the control in unsafe mode. If users respond No, load the control with its default properties. \n \n - For an SFI signed control, load in safe mode. \n \n 4 - For a UFI signed control, load with the default properties of the control. For an SFI signed control, load in safe mode (considered to be the safest mode). \n \n If you disable or do not configure this policy setting, the behavior is as if you enable this policy setting and then select option 1.  ","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_LoadControlsinForms3;L_LoadControlsinForms3colon","uniqueId":2009,"displayName":"Load Controls in Forms3:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"2","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"3","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"4","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":1,"description":"This policy setting allows you to control how ActiveX controls in UserForms should be initialized based upon whether they are Safe For Initialization (SFI) or Unsafefor Initialization (UFI). \n \n ActiveX controls are Component Object Model (COM) objects and have unrestricted access to users' computers. ActiveX controls can access the local file system and change the registry settings of the operating system. If a malicious user repurposes an ActiveX control to take over a user's computer, the effect could be significant. To help improve security, ActiveX developers can mark controls as Safe For Initialization (SFI), which means that the developer states that the controls are safe to open and run and not capable of causing harm to any computers. If a control is not marked SFI, the control could adversely affect a computer--or it's possible the developers did not test the control in all situations and are not sure whether their control might be compromised at some future date.SFI controls run in safe mode, which limits their access to the computer. For example, a worksheet control can both read and write files when it is in unsafe mode, but perhaps only read from files when it is in safe mode. This functionality allows the control to be used in very powerful ways when safety wasn't important, but the control would still be safe for use in a Web page. If a control is not marked as SFI, it is marked Unsafe For Initialization (UFI), which means that it is capable of affecting a user's computer. If UFI ActiveX controls are loaded, they are always loaded in unsafe mode. \n \n If you enable this policy setting, you can choose from four options for loading controls in UserForms: \n \n 1- For a UFI or SFI signed control that supports safe and unsafe mode, load the control in unsafe mode. For an SFI signed control that only supports a safe mode configuration, load the control in safe mode. This option enforces the default configuration. \n \n 2 - Users are prompted to determine how UserForm forms will load. The prompt only displays once per session within an application. When users respond to the prompt, loading continues based on whether the control is UFI or SFI: \n \n - For a UFI signed control, if users respond Yes to the prompt, load the control in unsafe mode. If users respond No, load the control using the default properties. \n \n - For an SFI signed control that supports both safe and unsafe modes, if users respond Yes to the prompt, load the control in unsafe mode. If users respond No, load the control using safe mode. If the SFI control can only support safe mode, load the control in safe mode. This option is the default configuration in the Microsoft Office 2016 release. \n \n 3 - Users are prompted to determine how UserForm forms will load. The prompt only displays once per session within an application. When users respond to the prompt, loading continues based on whether the control is UFI or SFI: \n \n - For a UFI signed control, if users respond Yes to the prompt, load the control in unsafe mode. If users respond No, load the control with its default properties. \n \n - For an SFI signed control, load in safe mode. \n \n 4 - For a UFI signed control, load with the default properties of the control. For an SFI signed control, load in safe mode (considered to be the safest mode). \n \n If you disable or do not configure this policy setting, the behavior is as if you enable this policy setting and then select option 1.  ","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\vba\\security","registrySubPath":"loadcontrolsinforms","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_LogCollection","uniqueId":2876,"displayName":"Allow users to include log files and relevant content samples when feedback is submitted to Microsoft","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether your users see an option to include additional log files and relevant content samples when they submit feedback to Microsoft. These files are generated by Microsoft as a result of your users’ interactions with Microsoft products. By default, users will see an option to include additional log files and relevant content samples when giving feedback to Microsoft. ​\nAdditional log files and relevant content samples make feedback from users more actionable. Microsoft will use this information to improve product experiences for users, including by improving the quality of AI-generated responses and troubleshooting product issues.​\nIf you enable or don’t configure this policy setting, your users will see an option to include additional log files and relevant content samples when they submit feedback to Microsoft. Users can decide to opt out. You will be able to view and manage feedback from your organization in the Microsoft 365 admin center. ​\nIf you disable this policy setting, your users will not see an option to include additional log files and relevant content samples when they submit feedback to Microsoft.​\nNote: This policy setting has no effect if the \"Allow users to submit feedback to Microsoft\" policy setting is set to Disabled.​\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio​\nNote: The behavior outlined in this policy will take effect starting on July 21, 2023.\n​\nFor more information, see ​https://go.microsoft.com/fwlink/?linkid=2142253","supportedPlatforms":["Windows","Web","Mac","iOS","Android"],"tags":["Trust Center","Privacy","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies","AnonymousPolicyAssignment"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\feedback","registrySubPath":"feedbackincludelog","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_LogFileEntriesNumber;L_empty420","uniqueId":2521,"displayName":"Log File Entries Number","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":1000},"dataType":"Integer"},"description":"Specify the number of log entries to be removed from the log file when the maximum size limit is exceeded. (1-1000)","supportedPlatforms":["Windows"],"tags":["Microsoft Office SmartArt","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\smartart graphics","registrySubPath":"logfilenumentriestoremove","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_LogFileEntriesNumber","uniqueId":2522,"displayName":"Log File Entries Number","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_LogFileEntriesNumber;L_empty420","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specify the number of log entries to be removed from the log file when the maximum size limit is exceeded. (1-1000)","supportedPlatforms":["Windows"],"tags":["Microsoft Office SmartArt","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_LogFileMaximumsize","uniqueId":2518,"displayName":"Log File Maximum Size","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_LogFileMaximumsize;L_LogFileMaximumsizePart","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specify the maximum size in bytes for the log file created when loading custom layouts. (Maximum = 100000)","supportedPlatforms":["Windows"],"tags":["Microsoft Office SmartArt","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_LogFileMaximumsize;L_LogFileMaximumsizePart","uniqueId":2517,"displayName":"Bytes:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":100000},"dataType":"Integer"},"description":"Specify the maximum size in bytes for the log file created when loading custom layouts. (Maximum = 100000)","supportedPlatforms":["Windows"],"tags":["Microsoft Office SmartArt","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\smartart graphics","registrySubPath":"logfilemaxsize","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Loop","uniqueId":5352,"displayName":"Create and view Loop files in Microsoft apps that support Loop","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can create and view Loop files in Microsoft apps that support Loop. For example, in Outlook, Word, and Teams.\n\nNote: There is also a \"Create and view Loop files in Outlook\" policy setting.\n\nIf you enable this policy setting, users can create and view Loop files in apps that support Loop.\n\nIf you disable this policy setting, users can’t create new Loop files in apps that support Loop. Also, those apps won’t provide live access to view and edit Loop components when a link to a Loop file is shared or displayed.\n\nIf you don’t configure this policy setting, users can create and view Loop files in apps that support Loop.\n\nNote: This policy setting doesn’t control whether non-Microsoft apps can access Loop files.\n\nNote: You can also control Loop by using the SharePoint PowerShell module. For more information, see https://go.microsoft.com/fwlink/?linkid=2204781. To maintain the best user experience, we recommend you configure this policy setting and the SharePoint setting the same.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["Loop","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\loop","registrySubPath":"Loop","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_LoopGroupWorkspaces","uniqueId":5353,"displayName":"Require Existing Microsoft 365 Group for New Loop Workspaces","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls how member rosters are created when setting up Loop workspaces. It determines whether an existing Microsoft 365 Group is required for roster management, lifecycle governance, and compliance, or if independent tenant-managed rosters are allowed.\n\nIf you enable this policy setting, users cannot create Loop workspaces directly in the Loop app. The Create workspace button is disabled and displays a tooltip directing users to create workspaces within Teams channels. Workspaces created in Teams channels are always associated with a Microsoft 365 Group and are managed as group-based workspaces.\n\nIf you disable or do not configure this policy setting, users can create workspaces from Teams channels, which are Microsoft 365 Group-managed, or create shared Loop workspaces with independent rosters. Independent roster workspaces are lifecycle-managed similar to SharePoint communication sites, but are not managed by a Microsoft 365 Group.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["LoopGroupWorkspaces","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\loop","registrySubPath":"LoopGroupWorkspaces","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Loop_App","uniqueId":5354,"displayName":"Create Loop workspaces in Loop","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can create Loop workspaces in the Loop web app, the Loop mobile apps, and the Microsoft 365 ecosystem.\n\nNote: If an admin disables the policy setting \"Create and view loop files in Microsoft apps that support Loop\" this policy setting is not affected.\n\nAn admin may choose to disable Loop components in Microsoft apps that support Loop, but this does not impact Loop workspaces in the Loop app itself. If an admin intends to disable all Loop experiences, set both \"Create and view loop files in Microsoft apps that support Loop\" and this policy setting.\n\nIf you enable this policy setting, users can create Loop workspaces in the Loop app.\n\nIf you disable this policy setting, users can’t create new Loop workspaces in the Loop app. The app will still boot and if the user has access to any content, it will be displayed and the user will maintain edit or view access to the content depending on their permissions.\n\nIf you don’t configure this policy setting, users can create Loop workspaces in the Loop app.\n\nNote: This policy setting doesn’t control whether non-Microsoft apps can access Loop files.\n\nNote: For US government GCC, GCC H, and DoD customers, Loop workspaces are not available, the admin policies do not apply and making any changes to this policy will not impact the Loop application.\n\nFor more information, see https://go.microsoft.com/fwlink/?linkid=2204781.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["LoopApp","Cloud Policies","AnonymousPolicyAssignment","Cloud Policies","AnonymousPolicyAssignment"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\loop","registrySubPath":"Loop_App","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Loop_App_Integrations","uniqueId":5355,"displayName":"Allow external data integrations in Loop so users can import, view and edit items using Loop","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This Policy will enable org admins to switch 2P/3P integrations on or off for their users. While this will be the umbrella policy, there will be individual control under this policy to enable admins to switch on/off individual 2P/3P apps for Loop.","supportedPlatforms":["iOS","Android","Web"],"tags":["LoopAppIntegrations","Cloud Policies Boolean","Cloud Policies","LoopAppIntegrations"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\loop","registrySubPath":"LoopAppIntegrations","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Loop_App_Integrations_DevOps","uniqueId":5356,"displayName":"Allow Azure DevOps external data integration in Loop so users can import, view and edit items using Loop","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can import, view, and edit Azure DevOps work items in Microsoft apps that support Loop, such as Outlook, Word, Teams, and Whiteboard.\n\nIf you enable this policy setting, users can import, view, and edit Azure DevOps work items in apps that support Loop.\n\nIf you disable this policy setting, users cannot import, view, or edit Azure DevOps work items in apps that support Loop. However, Loop pages that already have an imported component can still be viewed in read-only mode.\n\nIf you don’t set the policy setting, users can import, view, and edit Azure DevOps work items in apps that support Loop.\n\nNote: This policy setting does not control Azure DevOps or its policies.\n\nFor more information, see https://go.microsoft.com/fwlink/?linkid=2248172.","supportedPlatforms":["Windows","iOS","Android","Web"],"tags":["LoopAppIntegrationsDevOps","Cloud Policies Boolean","Cloud Policies","LoopAppIntegrations"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\loop","registrySubPath":"LoopAppIntegrationsDevOps","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Loop_App_Integrations_GitHub","uniqueId":5357,"displayName":"Allow GitHub external data integration in Loop so users can import, view and edit items using Loop","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls whether users can import, view, and edit GitHub issues in Microsoft apps that support Loop, such as Outlook, Word, Teams, and Whiteboard.\n\nIf you enable this policy setting, users can import, view, and edit GitHub issues and pull requests in apps that support Loop.\n\nIf you disable this policy setting, users cannot import, view, or edit GitHub issues and pull requests in apps that support Loop. However, Loop pages that already have an imported component can still be viewed in read only mode.\n\nIf you do not set this policy, users can import, view, and edit GitHub issues and pull requests in apps that support Loop.\n\nNote: This policy does not control GitHub or its policies.\n\nNote: GitHub integration with Loop can also be managed using the SharePoint power share module. For more information, see [hyperlink]. To maintain the best user experience, we recommend you configure this policy setting and the SharePoint setting at the same.\n\nFor more information, see https://go.microsoft.com/fwlink/?linkid=2248602.","supportedPlatforms":["iOS","Android","Web"],"tags":["LoopAppIntegrationsGitHub","Cloud Policies Boolean","Cloud Policies","LoopAppIntegrations"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\loop","registrySubPath":"LoopAppIntegrationsGitHub","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Loop_App_Integrations_Jira","uniqueId":5358,"displayName":"Allow Jira external data integration in Loop so users can import, view and edit items using Loop","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can import, view, and edit Jira issues in Microsoft apps that support Loop, such as Outlook, Word, Teams, and Whiteboard.\n\nIf you enable this policy setting, users can Import, view, and edit, Jira issues in apps that support Loop.\n\nIf you disable this policy setting, users cannot import, view, or edit Jira issues in apps that support Loop. However, Loop pages that already have an imported component can still be viewed in read only mode.\n\nIf you don't configure this policy setting, users can import, view, and edit Jira issues in apps that support Loop.\n\nNote: This policy setting doesn't control Jira or its policies.\n\nNote: Jira's integration with Loop can also be managed using the SharePoint power share module. For more information, see <hyperlink>. To maintain the best user experience, we recommend you configure this policy setting and the SharePoint setting at the same.\n\nFor more information, see https://go.microsoft.com/fwlink/?linkid=2248171.","supportedPlatforms":["iOS","Android","Web"],"tags":["LoopAppIntegrationsJira","Cloud Policies Boolean","Cloud Policies","LoopAppIntegrations"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\loop","registrySubPath":"LoopAppIntegrationsJira","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Loop_App_Integrations_PowerAutomate","uniqueId":5359,"displayName":"Set-up and execute automation rules in Loop via Power automate integration","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls the ability of users to set-up and execute automation rules powered by Power Automate in Loop and Microsoft apps that support Loop, such as Outlook, Word, and Teams.\n\nIf you enable this policy setting, users can set-up and execute automation rules powered by Power Automate in apps that support Loop.\n\nIf you disable this policy setting, users will be unable to set-up and execute automation rules powered by Power Automate in apps that support Loop. Previously set-up rules in Loop pages will be disabled on runtime if you choose to disable this policy.\n\nIf you do not set the policy setting, users can set-up and execute automation rules powered by Power Automate in apps that support Loop.\n\nNote: This policy setting does not control Power Automate or its policies.\n\nFor more information, see https://go.microsoft.com/fwlink/?linkid=2248603.","supportedPlatforms":["iOS","Android","Web"],"tags":["LoopAppIntegrationsPowerAutomate","Cloud Policies Boolean","Cloud Policies","LoopAppIntegrations"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\loop","registrySubPath":"LoopAppIntegrationsPowerAutomate","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Loop_App_Integrations_Trello","uniqueId":5360,"displayName":"Allow Trello external data integration in Loop so users can import, view and edit items using Loop","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls whether users can import, view, and edit Trello boards in Microsoft apps that support Loop, such as Outlook, Word, Teams, and Whiteboard.\n\nIf you enable this policy setting, users can import, view, and edit Trello boards in apps that support Loop.\n\nIf you disable this policy setting, users cannot import, view, or edit Trello boards in apps that support Loop. However, Loop pages that already have an imported component can still be viewed in read only mode.\n\nIf you do not set this policy, users can import, view, and edit Trello boards in apps that support Loop.\n\nNote: This policy does not control Trello or its policies.\n\nNote: Trello integration with Loop can also be managed using the SharePoint power share module. For more information, see [hyperlink]. To maintain the best user experience, we recommend you configure this policy setting and the SharePoint setting at the same.\n\nFor more information, see https://go.microsoft.com/fwlink/?linkid=2248546.","supportedPlatforms":["iOS","Android","Web"],"tags":["LoopAppIntegrationsTrello","Cloud Policies Boolean","Cloud Policies","LoopAppIntegrations"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\loop","registrySubPath":"LoopAppIntegrationsTrello","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Loop_app_SPOSiteStorage","uniqueId":5361,"displayName":"Create and view Loop files in Loop using workspaces in SPO Sites","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the users can create and view Loop files in Loop.  It is a non-standard setting and will eventually be replaced by fully functional SharePoint storage platform capabilities.\n\nNote: If you disable the policy setting “Create and view loop files in Microsoft apps that support ,” this policy setting is not affected.  Disabling Loop components in Microsoft apps that support Loop will not affect the Loop app itself. To disable all Loop experiences, both \"Create and view loop files in Microsoft apps that support Loop\" and this policy setting must be set to disable.\n\nIf you enable this policy setting, users will have the ability to create and view Loop files within the Loop app. Additionally, this setting will instruct the Loop app to create new Loop workspaces on SharePoint sites rather than using the SharePoint storage platform.\n\nWhen this policy setting is disabled, users will be unable to create new Loop files within the Loop app. Although the app will launch and display accessible content, editing functionality will be disabled for the users.\n\nIf this policy setting is not configured, its functionality will be equivalent to being disabled.\n\nNote: This policy setting doesn’t control whether non-Microsoft apps can access Loop files.\n\nNote: You can also control Loop by using the SharePoint PowerShell module. For more information, see https://go.microsoft.com/fwlink/?linkid=2204781","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["LoopAppSPOSiteStorage","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\loop","registrySubPath":"LoopAppSPOSiteStorage","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Loop_BizChatDocs","uniqueId":5362,"displayName":"Create and view Copilot Pages and Copilot Notebooks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether users can create and view Copilot Pages and Copilot Notebooks via Microsoft 365 Copilot Chat and Copilot Actions.\n\nIf you enable this policy setting, users can create and view Copilot Pages (a Loop file) and Copilot Notebooks via Microsoft 365 Copilot Chat and Copilot Actions.\n\nIf you disable this policy setting, users will be unable to create new Copilot Pages (a Loop file) or Copilot Notebooks via Microsoft 365 Copilot Chat and Copilot Actions. Microsoft 365 Copilot Chat will not provide live access to view and edit Loop files when a link to a Loop file is shared or displayed. Emails and Teams messages notifications will be disabled in Copilot Actions.\n\nIf you do not configure this policy setting, users can create and view Copilot Pages (a Loop file) and Copilot Notebooks via Microsoft 365 Copilot Chat and Copilot Actions.\n\nNote: This policy setting is separate from the \"Create and view Loop files in Microsoft apps that support Loop\" setting and is not affected by it.\n\nNote: Copilot Notebooks additionally require a Microsoft 365 Copilot license.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["LoopBizChatDocs","Cloud Policies Boolean","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\loop","registrySubPath":"LoopBizChatDocs","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Loop_CodePreviewer","uniqueId":5363,"displayName":"Enable code previews for AI-generated content in Microsoft 365 Copilot Chat and Copilot Pages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy setting controls whether users can run and view AI-generated code in Microsoft 365 Copilot Chat and Copilot Pages.\n\nIf you enable this policy setting, users can view and interact with code previews generated by Copilot in Copilot Pages.\n\nIf you disable this policy setting, Copilot will not run code previews in chat or Pages.\n\nIf you do not configure this policy setting, code previews are enabled by default.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["LoopCodePreviewer","Cloud Policies Boolean","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\loop","registrySubPath":"LoopCodePreviewer","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Loop_Figma","uniqueId":5364,"displayName":"Unfurl Figma file & prototype links as embeds in Loop pages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls the display behavior of Figma file & prototype links in Microsoft apps that support Loop, such as Outlook, Word, Teams, and Whiteboard.\n\nIf you enable this policy setting, Figma file & prototype links will unfurl as navigable & viewable embeds in Microsoft apps that support Loop. Users can choose how a Figma link appears, either as an embed, a link preview, or as a URL post-unfurl, through Link Options.\n\nIf you disable this policy setting, Figma file & prototype links will not unfurl as embeds in Microsoft apps that support Loop. Additionally, users lose the capability to display existing Figma links as embeds using Link Options.\n\nIf you do not set this policy, Figma file & prototype links will unfurl as navigable & viewable embeds in Microsoft apps that support Loop. Users retain the choice to decide the display style of a Figma link, either as an embed, a link preview, or a URL post-unfurl, through Link Options.\n\nNote: This policy does not exert control over Figma or its associated policies.\n\nFor more information, see https://go.microsoft.com/fwlink/?linkid=2248601.","supportedPlatforms":["Windows","iOS","Android","Web"],"tags":["LoopFigma","Cloud Policies Boolean","Cloud Policies","LoopAppIntegrations"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\loop","registrySubPath":"LoopFigma","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Loop_Planner","uniqueId":5365,"displayName":"View and edit Planner plans with the Planner Loop component","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can create, view, and edit Planner plans using the Planner Loop component, which is found in the Loop app and other Microsoft applications. For example, applications such as Outlook, Word, and Teams.\n\nNote: This policy setting doesn't control whether the Loop task list can create and sync with Planner plans.\n\nNote: This policy setting is ignored if the \"Create and view Loop files in Microsoft apps that support Loop\" policy setting is set to Disabled. If the \"Create and view Loop files in Microsoft apps that support Loop\" policy setting is set to Enabled or Not Configured, this policy setting takes precedence.\n\nIf you enable this policy setting, users with a Planner license can create, view, and edit Planner plans with the Planner Loop component in apps that support Loop.\n\nIf you disable this policy setting, users can’t create new Planner plans with the Planner Loop component in apps that support Loop. Also, those apps won’t provide live access to view and edit Planner plans with the Planner Loop component when a link to a Planner plan is shared or displayed.\n\nIf you don’t configure this policy setting, users with a Planner license can create, view, and edit Planner plans with the Planner Loop component in apps that support Loop.\n\nNote: This policy setting doesn’t control whether non-Microsoft apps can access Planner plans as a Loop component.\n\nNote: You can also control Loop by using the SharePoint PowerShell module. For more information, see https://go.microsoft.com/fwlink/?linkid=2204781. To maintain the best user experience, we recommend you configure this policy setting and the SharePoint setting the same.","supportedPlatforms":["Web"],"tags":["LoopPlanner","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\loop","registrySubPath":"LoopPlanner","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Loop_Polls","uniqueId":5366,"displayName":"View and Edit Polls with the Polls Loop component","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls the ability of users to create, view, and edit polls using the Polls Loop component in Microsoft applications such as Outlook and Word.\n\nIf you enable this policy setting, users with a Microsoft Forms license can create, view, and edit polls using the Polls Loop component in applications that support Loop.\n\nIf you disable this policy setting, users will not be able to create new polls using the Polls Loop component in applications that support Loop. Additionally, these applications will not provide live access to view and edit polls with the Polls Loop component when a link to a poll is shared or displayed.\n\nIf you do not set this policy setting, users with a Microsoft Forms license can create, view, and edit polls using the Polls Loop component in applications that support Loop.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["LoopPolls","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\loop","registrySubPath":"LoopPolls","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Loop_Whiteboard","uniqueId":5368,"displayName":"Create and view Whiteboard files in Microsoft apps that support Loop","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls whether users can create and view Whiteboard files in Microsoft apps that support Loop, such as the Loop app and Teams.\n\nIf you enable this policy setting, users can create and view Whiteboard files in apps that support Loop.\n\nIf you disable this policy setting, users will be unable to create new Whiteboard files in apps that support Loop. Additionally, these apps won’t provide live access to view and edit Whiteboard Loop components when a link to a Whiteboard file is shared or displayed.\n\nIf you do not set the policy setting, users can create and view Whiteboard files in apps that support Loop.\n\nNote: This functionality only works if OneDrive for Business storage for Microsoft Whiteboard is enabled. For more information about OneDrive for Business storage overview for Whiteboard, see https://learn.microsoft.com/en-us/microsoft-365/whiteboard/manage-data-organizations?view=o365-worldwide#onedrive-for-business-storage-overview.\n\nNote: You can also control Whiteboard integration with Loop by using SharePoint PowerShell module. For more information, see https://learn.microsoft.com/en-us/microsoft-365/whiteboard/manage-whiteboard-access-organizations?view=o365-worldwide. To maintain the best user experience, we recommend you configure this policy setting and the SharePoint setting the same.\n\nFor more information, see https://go.microsoft.com/fwlink/?linkid=2248545.","supportedPlatforms":["Windows","iOS","Android","Web"],"tags":["LoopAppWhiteboard","Cloud Policies Boolean","Cloud Policies","LoopAppIntegrations"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\loop","registrySubPath":"LoopWhiteboard","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_LowerSorbian","uniqueId":2242,"displayName":"Lower Sorbian","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Lower Sorbian","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"dsb-de","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_LuxembourgishLuxembourg","uniqueId":2179,"displayName":"Luxembourgish (Luxembourg)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Luxembourgish (Luxembourg)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"lb-lu","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_M365LinksBrowserChoice","uniqueId":5369,"displayName":"Choose which browser opens web links","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Default Browser","description":"","tags":[],"dependencyGroup":null},{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Microsoft Edge","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls which browser will open web links from within supported Microsoft 365 apps. By default, web links will open in Microsoft Edge.\n\nNote: This policy doesn’t override any user settings or policies that specify that document links should open in the desktop apps instead of their web app counterparts.\n\nIf you enable this policy, you can choose either “System default browser” or a specific browser, such as “Microsoft Edge.” “System default browser” refers to the browser setting specified on the user’s Windows device.\n\nIf you disable or don’t configure this policy, web links will open in Microsoft Edge. The user can set their preferred browser from the settings for the specific Microsoft 365 app.\n\nFor more information, see https://go.microsoft.com/fwlink/p/?linkid=2224834.","supportedPlatforms":["Windows","Web"],"tags":["M365LinksBrowserChoice","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\links","registrySubPath":"browserchoice","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Macedonian","uniqueId":2180,"displayName":"Macedonian","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Macedonian","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"mk-mk","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_MacroRuntimeScanScope","uniqueId":2928,"displayName":"Macro Runtime Scan Scope","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_MacroRuntimeScanScope;L_MacroRuntimeScanScopeEnum","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the behavior for both the VBA and Excel 4.0 (XLM) runtime scan features. Multiple Office apps support VBA macros, but XLM macros are only supported by Excel. Macros can only be scanned if the anti-virus software registers as an Antimalware Scan Interface (AMSI) provider on the device.\n\nIf you enable this policy setting, you can choose from the following options to determine the macro runtime scanning behavior:\n\n- Disable for all files (not recommended): If you choose this option, no runtime scanning of enabled macros will be performed.\n\n- Enable for low trust files: If you choose this option, runtime scanning will be enabled for all files for which macros are enabled, except for the following files:\n      - Files opened while macro security settings are set to “Enable All Macros”\n      - Files opened from a Trusted Location\n      - Files that are Trusted Documents\n      - Files that contain VBA that is digitally signed by a Trusted Publisher\n\n- Enable for all files: If you choose this option, then low trust files are not excluded from runtime scanning.\n\n- Enable for files, excluding documents marked as trusted by an admin: If you choose this option, runtime scanning will be enabled for all files for which macros are enabled, except for the following files:\n      - Files opened from a Trusted Location\n      - Files that contain VBA that is digitally signed by a Trusted Publisher\n\nThe VBA and XLM runtimes report to an antivirus system certain high-risk code behaviors the macro is about to execute. This allows the antivirus system to indicate whether or not the macro behavior is malicious. If the behavior is determined to be malicious, the Office application closes the session and the antivirus system can quarantine the file. If the behavior is non-malicious, the macro execution proceeds.\n\nNote: When macro runtime scanning is enabled, the runtime performance of affected VBA projects and XLM sheets may be reduced.\n\nIf you disable this policy setting, no runtime scanning of enabled macros will be performed.\n\nIf you don’t configure this policy setting, “Enable for low trust files” will be the default setting.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_MacroRuntimeScanScope;L_MacroRuntimeScanScopeEnum","uniqueId":2927,"displayName":"Macro Runtime Scan Scope","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable for all documents","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable for low trust documents","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable for all documents","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Scan excluding documents marked as trusted by an admin","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting specifies the behavior for both the VBA and Excel 4.0 (XLM) runtime scan features. Multiple Office apps support VBA macros, but XLM macros are only supported by Excel. Macros can only be scanned if the anti-virus software registers as an Antimalware Scan Interface (AMSI) provider on the device.\n\nIf you enable this policy setting, you can choose from the following options to determine the macro runtime scanning behavior:\n\n- Disable for all files (not recommended): If you choose this option, no runtime scanning of enabled macros will be performed.\n\n- Enable for low trust files: If you choose this option, runtime scanning will be enabled for all files for which macros are enabled, except for the following files:\n      - Files opened while macro security settings are set to “Enable All Macros”\n      - Files opened from a Trusted Location\n      - Files that are Trusted Documents\n      - Files that contain VBA that is digitally signed by a Trusted Publisher\n\n- Enable for all files: If you choose this option, then low trust files are not excluded from runtime scanning.\n\n- Enable for files, excluding documents marked as trusted by an admin: If you choose this option, runtime scanning will be enabled for all files for which macros are enabled, except for the following files:\n      - Files opened from a Trusted Location\n      - Files that contain VBA that is digitally signed by a Trusted Publisher\n\nThe VBA and XLM runtimes report to an antivirus system certain high-risk code behaviors the macro is about to execute. This allows the antivirus system to indicate whether or not the macro behavior is malicious. If the behavior is determined to be malicious, the Office application closes the session and the antivirus system can quarantine the file. If the behavior is non-malicious, the macro execution proceeds.\n\nNote: When macro runtime scanning is enabled, the runtime performance of affected VBA projects and XLM sheets may be reduced.\n\nIf you disable this policy setting, no runtime scanning of enabled macros will be performed.\n\nIf you don’t configure this policy setting, “Enable for low trust files” will be the default setting.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security","registrySubPath":"macroruntimescanscope","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Malayalam","uniqueId":2183,"displayName":"Malayalam","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Malayalam","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ml-in","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_MalayBrunei","uniqueId":2181,"displayName":"Malay (Brunei)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Malay (Brunei)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ms-bn","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_MalayMalaysia","uniqueId":2182,"displayName":"Malay (Malaysia)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Malay (Malaysia)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ms-my","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Maltese","uniqueId":2184,"displayName":"Maltese","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Maltese","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"mt-mt","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Manipuri","uniqueId":2185,"displayName":"Manipuri","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Manipuri","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"mni-in","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Maori","uniqueId":2186,"displayName":"Maori","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Maori","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"mi-nz","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_MapChartITAdminOptIn","uniqueId":2311,"displayName":"Allow Map Charts to send geographic data to Bing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Map Charts can send geographic data to Bing.  For more information about Map Charts, see https://go.microsoft.com/fwlink/?linkid=2194000.\n\nIf you enable this policy setting, when a user adds geographic data to a new or existing map chart, that data will be sent to Bing and the map chart will be updated to include any new locations.\n\nIf you disable this policy setting, when a user adds geographic data to a new or existing map chart, the geographic data won’t be sent to Bing and the map chart won’t be updated to include any new locations. Also, the user will see a message letting them know that their map chart can’t be created.\n\nIf you don’t configure this policy setting, when a user adds geographic data to a new or existing map chart, that data will be sent to Bing and the map chart will be updated to include any new locations.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Graph settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\charting","registrySubPath":"aremapchartsenabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Mapudungun","uniqueId":2187,"displayName":"Mapudungun","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Mapudungun","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"arn-cl","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Marathi","uniqueId":2188,"displayName":"Marathi","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Marathi","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"mr-in","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_MaxImplicitCacheSize","uniqueId":1548,"displayName":"Set the max size of the Office Document Cache","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_MaxImplicitCacheSize;L_MaxImplicitCacheSizeDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy controls how large the user's Office Document Cache can be. It does not apply to explicitly cached files on \"OneDrive for Business Client\" and \"OneDrive (consumer) Client\".","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_MaxImplicitCacheSize;L_MaxImplicitCacheSizeDecimal","uniqueId":1547,"displayName":"Percent of disk space","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":20},"dataType":"Integer"},"description":"This policy controls how large the user's Office Document Cache can be. It does not apply to explicitly cached files on \"OneDrive for Business Client\" and \"OneDrive (consumer) Client\".","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\fileio","registrySubPath":"maxcachesize","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Maximumnumberofdaystoscanfromtodaytodetermine;L_empty429","uniqueId":2553,"displayName":"Maximum number of days to scan from today to determine the user's colleagues for recommendation","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":5,"maximum":60},"dataType":"Integer"},"defaultValue":"20","description":"The maximum number of days to scan the Outlook mailbox to determine the colleagues the user has. The larger the number, the more accurate the recommendation. The smaller the number, the faster the recommendations are generated.","supportedPlatforms":["Windows"],"tags":["SharePoint Server","Server Settings","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\portal\\colleagueimport","registrySubPath":"maximumdaystoscan","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Maximumnumberofdaystoscanfromtodaytodetermine","uniqueId":2554,"displayName":"Maximum number of days to scan from today to determine the user's colleagues for recommendation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Maximumnumberofdaystoscanfromtodaytodetermine;L_empty429","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The maximum number of days to scan the Outlook mailbox to determine the colleagues the user has. The larger the number, the more accurate the recommendation. The smaller the number, the faster the recommendations are generated.","supportedPlatforms":["Windows"],"tags":["SharePoint Server","Server Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Maximumnumberofitemstoscanfromtoday;L_empty428","uniqueId":2551,"displayName":"Maximum number of items to scan from today to determine the user's colleagues for recommendation","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":2500},"dataType":"Integer"},"defaultValue":"500","description":"The maximum number of items to scan in the Outlook mailbox to determine the colleagues the user has. The larger the number, the more accurate the recommendation. The smaller the number, the faster the recommendations are generated.","supportedPlatforms":["Windows"],"tags":["SharePoint Server","Server Settings","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\portal\\colleagueimport","registrySubPath":"maximumitemstoscan","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Maximumnumberofitemstoscanfromtoday","uniqueId":2552,"displayName":"Maximum number of items to scan from today to determine the user's colleagues for recommendation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Maximumnumberofitemstoscanfromtoday;L_empty428","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The maximum number of items to scan in the Outlook mailbox to determine the colleagues the user has. The larger the number, the more accurate the recommendation. The smaller the number, the faster the recommendations are generated.","supportedPlatforms":["Windows"],"tags":["SharePoint Server","Server Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_MaximumnumberofreceipientsinanOutlookitem;L_empty430","uniqueId":2555,"displayName":"Maximum number of recipients in an Outlook item to scan to determine the user's colleagues for recommendation","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":15,"maximum":100},"dataType":"Integer"},"description":"The maximum number of recipients in an Outlook item to scan to determine the colleagues the user has. The larger the number, the more accurate the recommendation. The smaller the number, the faster the recommendations are generated.","supportedPlatforms":["Windows"],"tags":["SharePoint Server","Server Settings","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\portal\\colleagueimport","registrySubPath":"maximumreceipientsperitem","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_MaximumnumberofreceipientsinanOutlookitem","uniqueId":2556,"displayName":"Maximum number of recipients in an Outlook item to scan to determine the user's colleagues for recommendation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_MaximumnumberofreceipientsinanOutlookitem;L_empty430","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The maximum number of recipients in an Outlook item to scan to determine the colleagues the user has. The larger the number, the more accurate the recommendation. The smaller the number, the faster the recommendations are generated.","supportedPlatforms":["Windows"],"tags":["SharePoint Server","Server Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_MaximumNumberOfRows;L_empty433","uniqueId":2562,"displayName":"Maximum number of rows fetched per request while populating a lookup in the SharePoint list control","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Default","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1","description":"","tags":[],"dependencyGroup":null},{"value":100,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"100","description":"","tags":[],"dependencyGroup":null},{"value":450,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"450","description":"","tags":[],"dependencyGroup":null},{"value":5000,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"5000","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"The maximum number of rows fetched per request while populating a lookup in the SharePoint list control. Based on a standalone server's recommended hardware configuration a good default would be about 5000. The limit helps improve the performance of the SharePoint list control and is a defense in depth measure to prevent loading the server.","supportedPlatforms":["Windows"],"tags":["SharePoint Server","Server Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\list\\settings","registrySubPath":"rowlimitforlookups","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_MaximumNumberOfRows","uniqueId":2563,"displayName":"Maximum number of rows fetched per request while populating a lookup in the SharePoint list control","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_MaximumNumberOfRows;L_empty433","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The maximum number of rows fetched per request while populating a lookup in the SharePoint list control. Based on a standalone server's recommended hardware configuration a good default would be about 5000. The limit helps improve the performance of the SharePoint list control and is a defense in depth measure to prevent loading the server.","supportedPlatforms":["Windows"],"tags":["SharePoint Server","Server Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Maxnumberofdocumentsbeingreviewedusingadhocreview;L_empty388","uniqueId":2446,"displayName":"Max number of documents being reviewed using ad hoc review","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":9999},"dataType":"Integer"},"description":"Sets the total number of documents that can be sent for review by a user using ad-hoc review before reusing registry entries from previous review cycles.","supportedPlatforms":["Windows"],"tags":["Collaboration Settings","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\reviewcycle\\adhoc\\docslots","registrySubPath":"maxdoc","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Maxnumberofdocumentsbeingreviewedusingadhocreview","uniqueId":2447,"displayName":"Max number of documents being reviewed using ad hoc review","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Maxnumberofdocumentsbeingreviewedusingadhocreview;L_empty388","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the total number of documents that can be sent for review by a user using ad-hoc review before reusing registry entries from previous review cycles.","supportedPlatforms":["Windows"],"tags":["Collaboration Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Maxnumberofdocumentsbeingreviewedusingsendforreview;L_empty385","uniqueId":2444,"displayName":"Max number of documents being reviewed using 'send for review'","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":9999},"dataType":"Integer"},"description":"Sets the total number of documents that can be sent for review by a user before reusing registry entries from previous review cycles.","supportedPlatforms":["Windows"],"tags":["Collaboration Settings","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\reviewcycle\\docslots","registrySubPath":"maxdoc","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Maxnumberofdocumentsbeingreviewedusingsendforreview","uniqueId":2445,"displayName":"Max number of documents being reviewed using 'send for review'","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Maxnumberofdocumentsbeingreviewedusingsendforreview;L_empty385","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the total number of documents that can be sent for review by a user before reusing registry entries from previous review cycles.","supportedPlatforms":["Windows"],"tags":["Collaboration Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_MaxRetries","uniqueId":2569,"displayName":"Set maximum number of retries when synchronization fails","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_MaxRetries;L_MaxRetriesDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the maximum number of times a failed synchronization operation can be retried.\n\nIf you enable this policy setting, you may specify the maximum number of times a failed synchronization operation can be retried.\n\nIf you disable or do not configure this policy setting, then a default value of 50 times will be used.","supportedPlatforms":["Windows"],"tags":["Synchronization","Business Data","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_MaxRetries;L_MaxRetriesDecimal","uniqueId":2568,"displayName":"Maximum number of retries","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":16383},"dataType":"Integer"},"description":"This policy setting allows you to specify the maximum number of times a failed synchronization operation can be retried.\n\nIf you enable this policy setting, you may specify the maximum number of times a failed synchronization operation can be retried.\n\nIf you disable or do not configure this policy setting, then a default value of 50 times will be used.","supportedPlatforms":["Windows"],"tags":["Synchronization","Business Data","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\business data\\synchronization","registrySubPath":"max retries","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Menuanimations","uniqueId":1592,"displayName":"Menu animations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Menuanimations;L_menuanimations209","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Checks/Unchecks the corresponding UI option.  This option only applies to CommandBars UI.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Menuanimations;L_menuanimations209","uniqueId":1591,"displayName":"Menu animations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"(System Default)","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Random","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Unfold","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Slide","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Fade","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the corresponding UI option.  This option only applies to CommandBars UI.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars","registrySubPath":"animation","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_MicrosoftOfficeshareddrawingcode","uniqueId":2705,"displayName":"Disable Microsoft Office shared drawing code for blip caching","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Disables blip (an image representation) caching in the shared drawing code GEL.  Caching can speed up certain operations.  Disabling blip caching can be used to prevent caching during file open operations.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\gelprefs","registrySubPath":"disableblipcaching","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_MicrosoftOfficeshareddrawingcodeformeta","uniqueId":2706,"displayName":"Disable Microsoft Office shared drawing code for metafile rendering","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Disables nearly all EMF's and WMF's will no longer be converted at runtime to be anti-aliased.  Examples of EMF/WMF's that would remain \"aliased\" are: clipart, OLE object placeholders, any user inserted EMF/WMF image, etc.  Any EMF/WMF containing text would be an exception to this and would be still getting anti-aliased.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\gelprefs","registrySubPath":"drawmfsasemfplus","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_MinimumtimebeforestartingColleague;L_empty431","uniqueId":2558,"displayName":"Minimum time before starting Colleague recommendation scan","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1000,"maximum":10000},"dataType":"Integer"},"defaultValue":"1000","description":"The minimum idle time (in milliseconds) to wait before the Colleague Import Outlook add-in begins to scan the mailbox.","supportedPlatforms":["Windows"],"tags":["SharePoint Server","Server Settings","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\portal\\colleagueimport","registrySubPath":"minimumidletime","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_MinimumtimebeforestartingColleague","uniqueId":2559,"displayName":"Minimum time before starting Colleague recommendation scan","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_MinimumtimebeforestartingColleague;L_empty431","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The minimum idle time (in milliseconds) to wait before the Colleague Import Outlook add-in begins to scan the mailbox.","supportedPlatforms":["Windows"],"tags":["SharePoint Server","Server Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Minimumtimetowaitbeforerescanning;L_empty432","uniqueId":2560,"displayName":"Minimum time to wait before rescanning the Outlook mailbox for new colleague recommendations","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":24},"dataType":"Integer"},"description":"The minimum time (in hours) to wait before rescanning the Outlook mailbox for new colleague recommendations.","supportedPlatforms":["Windows"],"tags":["SharePoint Server","Server Settings","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\portal\\colleagueimport","registrySubPath":"minimumstaletime","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Minimumtimetowaitbeforerescanning","uniqueId":2561,"displayName":"Minimum time to wait before rescanning the Outlook mailbox for new colleague recommendations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Minimumtimetowaitbeforerescanning;L_empty432","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The minimum time (in hours) to wait before rescanning the Outlook mailbox for new colleague recommendations.","supportedPlatforms":["Windows"],"tags":["SharePoint Server","Server Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_MinSigSupportOS","uniqueId":2898,"displayName":"Set the minimum operating system for verifying agile VBA signatures","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_MinSigSupportOS;L_MinSigSupportOSDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to set the minimum operating system (OS) on which agile VBA signatures produced by Office can be verified. This ensures the hashing algorithm used to sign is compatible with the specified OS and later versions. \n\nIf you enable this policy setting, Office uses the OS you specify as the minimum OS to verify agile VBA signatures.\n\nIf you disable or do not configure this policy setting, Office uses Windows 7 as the minimum OS to verify agile VBA signatures.\n\nIf you specify a minimum OS version that is higher than the highest OS supported by Office, Office uses the highest supported OS to verify agile VBA signatures.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies","VBA"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_MinSigSupportOS;L_MinSigSupportOSDropID","uniqueId":2897,"displayName":"Set the minimum operating system for verifying agile VBA signatures","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Windows XP","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Windows Vista","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Windows 7","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Windows 8","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":2,"description":"This policy setting allows you to set the minimum operating system (OS) on which agile VBA signatures produced by Office can be verified. This ensures the hashing algorithm used to sign is compatible with the specified OS and later versions. \n\nIf you enable this policy setting, Office uses the OS you specify as the minimum OS to verify agile VBA signatures.\n\nIf you disable or do not configure this policy setting, Office uses Windows 7 as the minimum OS to verify agile VBA signatures.\n\nIf you specify a minimum OS version that is higher than the highest OS supported by Office, Office uses the highest supported OS to verify agile VBA signatures.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite","VBA"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\vba\\security","registrySubPath":"minsigsupportos","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Model3DBlockedExtensions","uniqueId":1532,"displayName":"Disable 3D Model File Formats List","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Model3DBlockedExtensions;L_Model3DBlockList","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a list of 3D model file formats that will be blocked from being loaded in Office applications.\n\nIf you enable this policy setting, you can specify a list of 3D Model file format that Office applications will block on insert or load. You should specify the list of 3D model file formats to block in a list of files extensions. For example, to block the FBX extension, enter the string “FBX”. To block the FBX and OBJ extensions, enter the string “FBX; OBJ”.\n\nIf you disable or do not configure this policy setting, Office applications do not restrict any 3D model file formats.\n","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Model3DBlockedExtensions;L_Model3DBlockList","uniqueId":1531,"displayName":"List of file extensions to block:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to specify a list of 3D model file formats that will be blocked from being loaded in Office applications.\n\nIf you enable this policy setting, you can specify a list of 3D Model file format that Office applications will block on insert or load. You should specify the list of 3D model file formats to block in a list of files extensions. For example, to block the FBX extension, enter the string “FBX”. To block the FBX and OBJ extensions, enter the string “FBX; OBJ”.\n\nIf you disable or do not configure this policy setting, Office applications do not restrict any 3D model file formats.\n","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\security","registrySubPath":"model3dblockextlist","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_Mohawk","uniqueId":2189,"displayName":"Mohawk","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Mohawk","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"moh-ca","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_MongolianCyrillic","uniqueId":2190,"displayName":"Mongolian (Cyrillic)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Mongolian (Cyrillic)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"mn-mn","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_MongolianTraditionalMongolian","uniqueId":2191,"displayName":"Mongolian (Traditional Mongolian)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Mongolian (Traditional Mongolian)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"mn-mong-cn","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_MoreActionsURL","uniqueId":1647,"displayName":"More actions URL","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_MoreActionsURL;L_MoreActionsURLEditID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify what URL to send users to when the More Actions button is clicked.  The More Actions button can be found under File tab | Options | Proofing | Autocorrect Options... | Actions | More Actions.\n\nIf you enable this policy setting and you specify a URL, the More Actions button will send the user to the specified URL.  If you enable this policy setting and you do not specify a URL (you leave the field blank), the More Actions button is disabled.\n\nIf you disable or do not configure this policy setting, the More Actions button will send the user to the default URL.","supportedPlatforms":["Windows"],"tags":["Additional Actions","Tools | AutoCorrect Options... (Excel, PowerPoint and Access)","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_MoreActionsURL;L_MoreActionsURLEditID","uniqueId":1646,"displayName":"More Actions URL:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify what URL to send users to when the More Actions button is clicked.  The More Actions button can be found under File tab | Options | Proofing | Autocorrect Options... | Actions | More Actions.\n\nIf you enable this policy setting and you specify a URL, the More Actions button will send the user to the specified URL.  If you enable this policy setting and you do not specify a URL (you leave the field blank), the More Actions button is disabled.\n\nIf you disable or do not configure this policy setting, the More Actions button will send the user to the default URL.","supportedPlatforms":["Windows"],"tags":["Additional Actions","Tools | AutoCorrect Options... (Excel, PowerPoint and Access)","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\smart tag","registrySubPath":"checkfornewsmarttags","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_MRUTemplateListLength","uniqueId":2708,"displayName":"Most Recently Used Template List Length","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_MRUTemplateListLength;L_mrutemplatelistlength505","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This setting determines the length of the recently used templates list in the New Document dialog box. The maximum value is 25 and the minimum value is 0. This setting applies to Word, Powerpoint, and Excel.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_MRUTemplateListLength;L_mrutemplatelistlength505","uniqueId":2707,"displayName":"Most Recently Used Template List Length","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":25},"dataType":"Integer"},"description":"This setting determines the length of the recently used templates list in the New Document dialog box. The maximum value is 25 and the minimum value is 0. This setting applies to Word, Powerpoint, and Excel.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"filenewmrumaxitems","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_MultiAcctCopilot","uniqueId":5370,"displayName":"Multiple account access to Copilot for work documents","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy setting controls multiple account access to Copilot, which allows your users to use Copilot in Microsoft 365 apps on work documents using a Copilot license from outside your organization. For example, if they have Copilot from a personal Copilot Pro subscription. By default, multiple account access is available to your users.\n\nIf you enable or don't configure this policy setting, your users can use Copilot on work documents with a Copilot license that is from outside your organization.\n\nIf you disable this policy setting, your users can’t use Copilot on work documents with a Copilot license that is from outside your organization.\n\nFor more information about multiple account access to Copilot, see https://go.microsoft.com/fwlink/p/?linkid=2300619","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["Microsoft Office 2016","Cloud Policies Boolean","MultiAcctCopilot","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\privacy","registrySubPath":"MultiAcctCopilot","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NepaliIndia","uniqueId":2192,"displayName":"Nepali (India)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Nepali (India)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ne-in","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NepaliNepal","uniqueId":2193,"displayName":"Nepali (Nepal)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Nepali (Nepal)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ne-np","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Neverallowuserstospecifygroupswhenrestrictingpermissionfordo","uniqueId":2496,"displayName":"Never allow users to specify groups when restricting permission for documents","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Office 2016 users can assign permissions to distribution lists when using Information Rights Management. \n\nIf you enable this policy setting, Office 2016 users cannot specify a distribution list as an authorized party in the Permission dialog box. \n\nIf you disable or do not configure this policy setting, Office 2016 users can specify distribution lists when using Information Rights Management (IRM) to restrict access to Excel workbooks, InfoPath templates, Outlook e-mail messages, PowerPoint presentations, or Word documents.","supportedPlatforms":["Windows"],"tags":["Manage Restricted Permissions","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\drm","registrySubPath":"neverallowdls","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoExtensibilityCustomizationFromDocumentPolicy","uniqueId":1586,"displayName":"Disable UI extending from documents and templates","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_NoExtensibilityCustomizationFromDocumentPolicy;L_NoExtensibilityCustomizationFromDocumentPolicyWord","logicalOperator":"exists","values":null},{"dependee":"office16;L_NoExtensibilityCustomizationFromDocumentPolicy;L_NoExtensibilityCustomizationFromDocumentPolicyExcel","logicalOperator":"exists","values":null},{"dependee":"office16;L_NoExtensibilityCustomizationFromDocumentPolicy;L_NoExtensibilityCustomizationFromDocumentPolicyPowerPoint","logicalOperator":"exists","values":null},{"dependee":"office16;L_NoExtensibilityCustomizationFromDocumentPolicy;L_NoExtensibilityCustomizationFromDocumentPolicyAccess","logicalOperator":"exists","values":null},{"dependee":"office16;L_NoExtensibilityCustomizationFromDocumentPolicy;L_NoExtensibilityCustomizationFromDocumentPolicyOutlook","logicalOperator":"exists","values":null},{"dependee":"office16;L_NoExtensibilityCustomizationFromDocumentPolicy;L_NoExtensibilityCustomizationFromDocumentPolicyPublisher","logicalOperator":"exists","values":null},{"dependee":"office16;L_NoExtensibilityCustomizationFromDocumentPolicy;L_NoExtensibilityCustomizationFromDocumentPolicyProject","logicalOperator":"exists","values":null},{"dependee":"office16;L_NoExtensibilityCustomizationFromDocumentPolicy;L_NoExtensibilityCustomizationFromDocumentPolicyVisio","logicalOperator":"exists","values":null},{"dependee":"office16;L_NoExtensibilityCustomizationFromDocumentPolicy;L_NoExtensibilityCustomizationFromDocumentPolicyInfoPath","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls whether Office 2016 applications load any custom user interface (UI) code included with a document or template.  Office 2016 allows developers to extend the UI with customization code that is included in a document or template. \n\nIf you enable this policy setting, Office 2016 applications cannot load any UI customization code included with documents and templates. \n\nIf you disable or do not configure this policy setting, Office 2016 applications load any UI customization code included with a document or template when opening it.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_NoExtensibilityCustomizationFromDocumentPolicy;L_NoExtensibilityCustomizationFromDocumentPolicyAccess","uniqueId":1580,"displayName":"Disallow in Access","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls whether Office 2016 applications load any custom user interface (UI) code included with a document or template.  Office 2016 allows developers to extend the UI with customization code that is included in a document or template. \n\nIf you enable this policy setting, Office 2016 applications cannot load any UI customization code included with documents and templates. \n\nIf you disable or do not configure this policy setting, Office 2016 applications load any UI customization code included with a document or template when opening it.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\access","registrySubPath":"noextensibilitycustomizationfromdocument","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoExtensibilityCustomizationFromDocumentPolicy;L_NoExtensibilityCustomizationFromDocumentPolicyExcel","uniqueId":1578,"displayName":"Disallow in Excel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls whether Office 2016 applications load any custom user interface (UI) code included with a document or template.  Office 2016 allows developers to extend the UI with customization code that is included in a document or template. \n\nIf you enable this policy setting, Office 2016 applications cannot load any UI customization code included with documents and templates. \n\nIf you disable or do not configure this policy setting, Office 2016 applications load any UI customization code included with a document or template when opening it.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\excel","registrySubPath":"noextensibilitycustomizationfromdocument","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoExtensibilityCustomizationFromDocumentPolicy;L_NoExtensibilityCustomizationFromDocumentPolicyInfoPath","uniqueId":1585,"displayName":"Disallow in InfoPath","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls whether Office 2016 applications load any custom user interface (UI) code included with a document or template.  Office 2016 allows developers to extend the UI with customization code that is included in a document or template. \n\nIf you enable this policy setting, Office 2016 applications cannot load any UI customization code included with documents and templates. \n\nIf you disable or do not configure this policy setting, Office 2016 applications load any UI customization code included with a document or template when opening it.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\infopath","registrySubPath":"noextensibilitycustomizationfromdocument","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoExtensibilityCustomizationFromDocumentPolicy;L_NoExtensibilityCustomizationFromDocumentPolicyOutlook","uniqueId":1581,"displayName":"Disallow in Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls whether Office 2016 applications load any custom user interface (UI) code included with a document or template.  Office 2016 allows developers to extend the UI with customization code that is included in a document or template. \n\nIf you enable this policy setting, Office 2016 applications cannot load any UI customization code included with documents and templates. \n\nIf you disable or do not configure this policy setting, Office 2016 applications load any UI customization code included with a document or template when opening it.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\outlook","registrySubPath":"noextensibilitycustomizationfromdocument","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoExtensibilityCustomizationFromDocumentPolicy;L_NoExtensibilityCustomizationFromDocumentPolicyPowerPoint","uniqueId":1579,"displayName":"Disallow in PowerPoint","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls whether Office 2016 applications load any custom user interface (UI) code included with a document or template.  Office 2016 allows developers to extend the UI with customization code that is included in a document or template. \n\nIf you enable this policy setting, Office 2016 applications cannot load any UI customization code included with documents and templates. \n\nIf you disable or do not configure this policy setting, Office 2016 applications load any UI customization code included with a document or template when opening it.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\powerpoint","registrySubPath":"noextensibilitycustomizationfromdocument","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoExtensibilityCustomizationFromDocumentPolicy;L_NoExtensibilityCustomizationFromDocumentPolicyProject","uniqueId":1583,"displayName":"Disallow in Project","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls whether Office 2016 applications load any custom user interface (UI) code included with a document or template.  Office 2016 allows developers to extend the UI with customization code that is included in a document or template. \n\nIf you enable this policy setting, Office 2016 applications cannot load any UI customization code included with documents and templates. \n\nIf you disable or do not configure this policy setting, Office 2016 applications load any UI customization code included with a document or template when opening it.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\project","registrySubPath":"noextensibilitycustomizationfromdocument","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoExtensibilityCustomizationFromDocumentPolicy;L_NoExtensibilityCustomizationFromDocumentPolicyPublisher","uniqueId":1582,"displayName":"Disallow in Publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls whether Office 2016 applications load any custom user interface (UI) code included with a document or template.  Office 2016 allows developers to extend the UI with customization code that is included in a document or template. \n\nIf you enable this policy setting, Office 2016 applications cannot load any UI customization code included with documents and templates. \n\nIf you disable or do not configure this policy setting, Office 2016 applications load any UI customization code included with a document or template when opening it.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\publisher","registrySubPath":"noextensibilitycustomizationfromdocument","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoExtensibilityCustomizationFromDocumentPolicy;L_NoExtensibilityCustomizationFromDocumentPolicyVisio","uniqueId":1584,"displayName":"Disallow in Visio","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls whether Office 2016 applications load any custom user interface (UI) code included with a document or template.  Office 2016 allows developers to extend the UI with customization code that is included in a document or template. \n\nIf you enable this policy setting, Office 2016 applications cannot load any UI customization code included with documents and templates. \n\nIf you disable or do not configure this policy setting, Office 2016 applications load any UI customization code included with a document or template when opening it.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\visio","registrySubPath":"noextensibilitycustomizationfromdocument","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoExtensibilityCustomizationFromDocumentPolicy;L_NoExtensibilityCustomizationFromDocumentPolicyWord","uniqueId":1577,"displayName":"Disallow in Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls whether Office 2016 applications load any custom user interface (UI) code included with a document or template.  Office 2016 allows developers to extend the UI with customization code that is included in a document or template. \n\nIf you enable this policy setting, Office 2016 applications cannot load any UI customization code included with documents and templates. \n\nIf you disable or do not configure this policy setting, Office 2016 applications load any UI customization code included with a document or template when opening it.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\word","registrySubPath":"noextensibilitycustomizationfromdocument","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NorwegianBokml","uniqueId":2194,"displayName":"Norwegian (Bokmål)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Norwegian (Bokm†l)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"nb-no","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NorwegianNynorsk","uniqueId":2195,"displayName":"Norwegian (Nynorsk)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Norwegian (Nynorsk)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"nn-no","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoUserCustomizationPolicy","uniqueId":1576,"displayName":"Turn off all user customizations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicyWord","logicalOperator":"exists","values":null},{"dependee":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicyExcel","logicalOperator":"exists","values":null},{"dependee":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicyPowerPoint","logicalOperator":"exists","values":null},{"dependee":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicyAccess","logicalOperator":"exists","values":null},{"dependee":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicyOutlook","logicalOperator":"exists","values":null},{"dependee":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicySPD","logicalOperator":"exists","values":null},{"dependee":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicyPublisher","logicalOperator":"exists","values":null},{"dependee":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicyProject","logicalOperator":"exists","values":null},{"dependee":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicyVisio","logicalOperator":"exists","values":null},{"dependee":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicyOneNote","logicalOperator":"exists","values":null},{"dependee":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicyInfoPath","logicalOperator":"exists","values":null},{"dependee":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicySPW","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting can prevent users from making any Quick Access Toolbar and the Ribbon customizations.  This includes customizations made through user interface (UI) entry points, or loaded from documents or templates.\n\nIf you enable this policy setting, users will not be able to customize the Quick Access Toolbar and Ribbon through either the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, or the right-click menu on the Ribbon.  In addition, Quick Access Toolbar and Ribbon customizations originating from documents or templates will not be loaded when these documents are opened.\n\nIf you disable or do not configure this policy setting, users can make Quick Access Toolbar and Ribbon customizations through the UI, as well as load them from documents and templates.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicyAccess","uniqueId":1567,"displayName":"Disallow in Access","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from making any Quick Access Toolbar and the Ribbon customizations.  This includes customizations made through user interface (UI) entry points, or loaded from documents or templates.\n\nIf you enable this policy setting, users will not be able to customize the Quick Access Toolbar and Ribbon through either the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, or the right-click menu on the Ribbon.  In addition, Quick Access Toolbar and Ribbon customizations originating from documents or templates will not be loaded when these documents are opened.\n\nIf you disable or do not configure this policy setting, users can make Quick Access Toolbar and Ribbon customizations through the UI, as well as load them from documents and templates.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\access","registrySubPath":"nousercustomization","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicyExcel","uniqueId":1565,"displayName":"Disallow in Excel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from making any Quick Access Toolbar and the Ribbon customizations.  This includes customizations made through user interface (UI) entry points, or loaded from documents or templates.\n\nIf you enable this policy setting, users will not be able to customize the Quick Access Toolbar and Ribbon through either the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, or the right-click menu on the Ribbon.  In addition, Quick Access Toolbar and Ribbon customizations originating from documents or templates will not be loaded when these documents are opened.\n\nIf you disable or do not configure this policy setting, users can make Quick Access Toolbar and Ribbon customizations through the UI, as well as load them from documents and templates.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\excel","registrySubPath":"nousercustomization","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicyInfoPath","uniqueId":1574,"displayName":"Disallow in InfoPath","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from making any Quick Access Toolbar and the Ribbon customizations.  This includes customizations made through user interface (UI) entry points, or loaded from documents or templates.\n\nIf you enable this policy setting, users will not be able to customize the Quick Access Toolbar and Ribbon through either the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, or the right-click menu on the Ribbon.  In addition, Quick Access Toolbar and Ribbon customizations originating from documents or templates will not be loaded when these documents are opened.\n\nIf you disable or do not configure this policy setting, users can make Quick Access Toolbar and Ribbon customizations through the UI, as well as load them from documents and templates.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\infopath","registrySubPath":"nousercustomization","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicyOneNote","uniqueId":1573,"displayName":"Disallow in OneNote","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from making any Quick Access Toolbar and the Ribbon customizations.  This includes customizations made through user interface (UI) entry points, or loaded from documents or templates.\n\nIf you enable this policy setting, users will not be able to customize the Quick Access Toolbar and Ribbon through either the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, or the right-click menu on the Ribbon.  In addition, Quick Access Toolbar and Ribbon customizations originating from documents or templates will not be loaded when these documents are opened.\n\nIf you disable or do not configure this policy setting, users can make Quick Access Toolbar and Ribbon customizations through the UI, as well as load them from documents and templates.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\onenote","registrySubPath":"nousercustomization","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicyOutlook","uniqueId":1568,"displayName":"Disallow in Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from making any Quick Access Toolbar and the Ribbon customizations.  This includes customizations made through user interface (UI) entry points, or loaded from documents or templates.\n\nIf you enable this policy setting, users will not be able to customize the Quick Access Toolbar and Ribbon through either the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, or the right-click menu on the Ribbon.  In addition, Quick Access Toolbar and Ribbon customizations originating from documents or templates will not be loaded when these documents are opened.\n\nIf you disable or do not configure this policy setting, users can make Quick Access Toolbar and Ribbon customizations through the UI, as well as load them from documents and templates.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\outlook","registrySubPath":"nousercustomization","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicyPowerPoint","uniqueId":1566,"displayName":"Disallow in PowerPoint","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from making any Quick Access Toolbar and the Ribbon customizations.  This includes customizations made through user interface (UI) entry points, or loaded from documents or templates.\n\nIf you enable this policy setting, users will not be able to customize the Quick Access Toolbar and Ribbon through either the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, or the right-click menu on the Ribbon.  In addition, Quick Access Toolbar and Ribbon customizations originating from documents or templates will not be loaded when these documents are opened.\n\nIf you disable or do not configure this policy setting, users can make Quick Access Toolbar and Ribbon customizations through the UI, as well as load them from documents and templates.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\powerpoint","registrySubPath":"nousercustomization","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicyProject","uniqueId":1571,"displayName":"Disallow in Project","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from making any Quick Access Toolbar and the Ribbon customizations.  This includes customizations made through user interface (UI) entry points, or loaded from documents or templates.\n\nIf you enable this policy setting, users will not be able to customize the Quick Access Toolbar and Ribbon through either the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, or the right-click menu on the Ribbon.  In addition, Quick Access Toolbar and Ribbon customizations originating from documents or templates will not be loaded when these documents are opened.\n\nIf you disable or do not configure this policy setting, users can make Quick Access Toolbar and Ribbon customizations through the UI, as well as load them from documents and templates.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\project","registrySubPath":"nousercustomization","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicyPublisher","uniqueId":1570,"displayName":"Disallow in Publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from making any Quick Access Toolbar and the Ribbon customizations.  This includes customizations made through user interface (UI) entry points, or loaded from documents or templates.\n\nIf you enable this policy setting, users will not be able to customize the Quick Access Toolbar and Ribbon through either the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, or the right-click menu on the Ribbon.  In addition, Quick Access Toolbar and Ribbon customizations originating from documents or templates will not be loaded when these documents are opened.\n\nIf you disable or do not configure this policy setting, users can make Quick Access Toolbar and Ribbon customizations through the UI, as well as load them from documents and templates.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\publisher","registrySubPath":"nousercustomization","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicySPD","uniqueId":1569,"displayName":"Disallow in SharePoint Designer","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from making any Quick Access Toolbar and the Ribbon customizations.  This includes customizations made through user interface (UI) entry points, or loaded from documents or templates.\n\nIf you enable this policy setting, users will not be able to customize the Quick Access Toolbar and Ribbon through either the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, or the right-click menu on the Ribbon.  In addition, Quick Access Toolbar and Ribbon customizations originating from documents or templates will not be loaded when these documents are opened.\n\nIf you disable or do not configure this policy setting, users can make Quick Access Toolbar and Ribbon customizations through the UI, as well as load them from documents and templates.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\sharepoint designer","registrySubPath":"nousercustomization","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicySPW","uniqueId":1575,"displayName":"Disallow in SharePoint Workspace","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from making any Quick Access Toolbar and the Ribbon customizations.  This includes customizations made through user interface (UI) entry points, or loaded from documents or templates.\n\nIf you enable this policy setting, users will not be able to customize the Quick Access Toolbar and Ribbon through either the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, or the right-click menu on the Ribbon.  In addition, Quick Access Toolbar and Ribbon customizations originating from documents or templates will not be loaded when these documents are opened.\n\nIf you disable or do not configure this policy setting, users can make Quick Access Toolbar and Ribbon customizations through the UI, as well as load them from documents and templates.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\groove","registrySubPath":"nousercustomization","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicyVisio","uniqueId":1572,"displayName":"Disallow in Visio","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from making any Quick Access Toolbar and the Ribbon customizations.  This includes customizations made through user interface (UI) entry points, or loaded from documents or templates.\n\nIf you enable this policy setting, users will not be able to customize the Quick Access Toolbar and Ribbon through either the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, or the right-click menu on the Ribbon.  In addition, Quick Access Toolbar and Ribbon customizations originating from documents or templates will not be loaded when these documents are opened.\n\nIf you disable or do not configure this policy setting, users can make Quick Access Toolbar and Ribbon customizations through the UI, as well as load them from documents and templates.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\visio","registrySubPath":"nousercustomization","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_NoUserCustomizationPolicy;L_NoUserCustomizationPolicyWord","uniqueId":1564,"displayName":"Disallow in Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting can prevent users from making any Quick Access Toolbar and the Ribbon customizations.  This includes customizations made through user interface (UI) entry points, or loaded from documents or templates.\n\nIf you enable this policy setting, users will not be able to customize the Quick Access Toolbar and Ribbon through either the Quick Access Toolbar and Ribbon tabs in the application's Office Center dialog box, or the right-click menu on the Ribbon.  In addition, Quick Access Toolbar and Ribbon customizations originating from documents or templates will not be loaded when these documents are opened.\n\nIf you disable or do not configure this policy setting, users can make Quick Access Toolbar and Ribbon customizations through the UI, as well as load them from documents and templates.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\word","registrySubPath":"nousercustomization","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Occitan","uniqueId":2196,"displayName":"Occitan","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Occitan","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"oc-fr","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Odia","uniqueId":2197,"displayName":"Odia","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Odia","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"or-in","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeAgent","uniqueId":5371,"displayName":"Allow users to use Office agent","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can use the Office agent.\n\nIf you enable this policy setting, users can see and use the Office agent.\n\nIf you disable or do not configure this policy setting, users can't see or use the Office agent.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["OfficeAgent","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"OfficeAgent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeDocumentCacheLocation","uniqueId":2528,"displayName":"Office document cache location","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_OfficeDocumentCacheLocation;L_OfficeDocumentCacheLocationID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting determines the location where Office maintains the Office Document Cache.\n\nIf you enable this policy setting, you can specify the location where Office maintains the Office Document Cache.\n\nIf you disable or do not configure this policy setting, the Office Document Cache will be stored in the following location: %LocalAppData%\\Microsoft\\Office\\16.0\\OfficeFileCache","supportedPlatforms":["Windows"],"tags":["Microsoft Office Document Cache","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_OfficeDocumentCacheLocation;L_OfficeDocumentCacheLocationID","uniqueId":2527,"displayName":"Office document cache location","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting determines the location where Office maintains the Office Document Cache.\n\nIf you enable this policy setting, you can specify the location where Office maintains the Office Document Cache.\n\nIf you disable or do not configure this policy setting, the Office Document Cache will be stored in the following location: %LocalAppData%\\Microsoft\\Office\\16.0\\OfficeFileCache","supportedPlatforms":["Windows"],"tags":["Microsoft Office Document Cache","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\fileio","registrySubPath":"msoridofficefilecachelocation","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_OfficeEnableAutoAltText","uniqueId":2973,"displayName":"Automatically generate alternative text (alt text) for pictures","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting controls whether alternative text (alt text) is generated automatically for pictures in Word, PowerPoint, and Outlook.\n\nThis policy setting is related to the \"Automatically generate alt text for me\" check box under File > Options > Ease of Access > Automatic Alt Text.\n\nIf you enable this policy setting, alt text will be generated automatically for pictures. The \"Automatically generate alt text for me\" check box will be selected and users won't be able to clear the check box.\n\nIf you disable this policy setting, alt text won't be generated automatically for pictures. The \"Automatically generate alt text for me\" check box won't be selected and users won't be able to select the check box.\n\nIf you don't configure this policy setting, alt text will be generated automatically for pictures. But, users will be able to clear the \"Automatically generate alt text for me\" check box.\n      ","supportedPlatforms":["Windows"],"tags":["Services","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\options","registrySubPath":"officeenableautoalttext","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeExperiencesAnlayzingContent","uniqueId":2949,"displayName":"Allow the use of connected experiences in Office that analyze content","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting allows you to control whether connected experiences that analyze content are available to your users when they're using Office.\n\nPowerPoint Designer and Editor in Word are examples of connected experiences that analyze content.\n\nIf you enable this policy setting, connected experiences that analyze content will be available to your users.\n\nIf you disable this policy setting, connected experiences that analyze content won't be available to your users.\n\nIf you don't configure this policy setting, connected experiences that analyze content will be available to your users.\n\nNote: If you disable the \"Allow the use of connected experiences in Office\" policy setting, connected experiences that analyze content won't be available to your users.\n\nFor more information, see https://go.microsoft.com/fwlink/p/?linkid=2085794\n\nNote: For information about how this policy setting affects Microsoft 365 Copilot, see https://go.microsoft.com/fwlink/p/?linkid=2248397.","supportedPlatforms":["Windows","Mac","iOS","Android"],"tags":["Trust Center","Privacy","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies","Copilot"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\privacy","registrySubPath":"usercontentdisabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeExperiencesDownloadingContent","uniqueId":2950,"displayName":"Allow the use of connected experiences in Office that download online content","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy setting allows you to control whether connected experiences that download online content are available to your users when they’re using Office.\n\nOffice templates and PowerPoint QuickStarter are examples of connected experiences that download online content.\n\nIf you enable this policy setting, connected experiences that download online content will be available to your users.\n\nIf you disable this policy setting, connected experiences that download online content won’t be available to your users.\n\nIf you don’t configure this policy setting, connected experiences that download online content will be available to your users.\n\nNote: If you disable the “Allow the use of connected experiences in Office” policy setting, connected experiences that download online content won’t be available to your users.\n\nFor more information, see https://go.microsoft.com/fwlink/p/?linkid=2085688","supportedPlatforms":["Windows","Mac","iOS","Android"],"tags":["Trust Center","Privacy","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\privacy","registrySubPath":"downloadcontentdisabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeInsiderUserExperience","uniqueId":2958,"displayName":"Show the option for Microsoft 365 Insider","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy setting controls whether the option for Microsoft 365 Insider is shown under File > Account in an app, such as Word.\n\nBy showing this option, a user can choose to join or leave the Microsoft 365 Insider program. For more information about the Microsoft 365 Insider program, see https://insider.office.com.\n\nIf you enable this policy setting, the option for Microsoft 365 Insider is shown under File > Account.\n\nNote: if you enable this policy setting, you shouldn’t enable and configure the “Update Channel” or the “Update Path” policy setting under Computer Configuration\\Policies\\Administrative Templates\\Microsoft Office 2016 (Machine)\\Updates. If you do, those policy settings will take precedence, even though the option for Microsoft 365 Insider is shown.\n\nIf you disable this policy setting, the option for Microsoft 365 Insider is not shown under File > Account.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"insiderslabbehavior","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeInventoryAgentFilemetadataObfuscation","uniqueId":2848,"displayName":"Turn on privacy settings in Office Telemetry Agent","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting configures Office Telemetry Agent to disguise, or obfuscate, certain file properties that are reported in telemetry data.\n\nIf you enable this policy setting, Office Telemetry Agent obfuscates the file name, file path, and title of Office documents before uploading telemetry data to the shared folder.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent uploads telemetry data that shows the full file name, file path, and title of all Office documents.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm","registrySubPath":"enablefileobfuscation","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeInventoryAgentUpload","uniqueId":2847,"displayName":"Turn on data uploading for Office Telemetry Agent","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting turns on the data uploading feature in Office Telemetry Agent.\n\nIf you enable this policy setting, Office Telemetry Agent periodically uploads telemetry data to a shared folder.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent does not upload any data. However, telemetry data is still collected on the local computer and can be viewed by using Office Telemetry Log.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm","registrySubPath":"enableupload","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeOSMCommonFileShare","uniqueId":2846,"displayName":"Specify the UNC path to store Office telemetry data","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_OfficeOSMCommonFileShare;L_OfficeOSMCommonFileShareFileShare","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the Uniform Naming Convention (UNC) path of a shared folder to which Office Telemetry Agent sends Office telemetry data.\n\nIf you enable this policy setting, Office Telemetry Agent uploads Office telemetry data to the UNC path that you specify. Use the format \\\\Server_Name\\Share_Name.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent does not send the data, and you cannot see any data in Office Telemetry Dashboard.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_OfficeOSMCommonFileShare;L_OfficeOSMCommonFileShareFileShare","uniqueId":2845,"displayName":"UNC path to store Office telemetry data:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify the Uniform Naming Convention (UNC) path of a shared folder to which Office Telemetry Agent sends Office telemetry data.\n\nIf you enable this policy setting, Office Telemetry Agent uploads Office telemetry data to the UNC path that you specify. Use the format \\\\Server_Name\\Share_Name.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent does not send the data, and you cannot see any data in Office Telemetry Dashboard.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm","registrySubPath":"commonfileshare","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_OfficeOSMCustomTags","uniqueId":2853,"displayName":"Specify custom tags for Office telemetry data","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_OfficeOSMCustomTags;L_OfficeOSMCustomTagsTag1","logicalOperator":"exists","values":null},{"dependee":"office16;L_OfficeOSMCustomTags;L_OfficeOSMCustomTagsTag2","logicalOperator":"exists","values":null},{"dependee":"office16;L_OfficeOSMCustomTags;L_OfficeOSMCustomTagsTag3","logicalOperator":"exists","values":null},{"dependee":"office16;L_OfficeOSMCustomTags;L_OfficeOSMCustomTagsTag4","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to add custom tags to the Office telemetry data that is sent by Office Telemetry Agent.\n\nIf you enable this policy setting, the specified custom tags are shown in Office Telemetry Dashboard, where you can filter the collected data by the tag name. You can specify any string that you want to categorize and filter the collected data (for example, department name, title of user, and so forth).\n\nIf you disable or do not configure this policy setting, no custom tags are shown in Office Telemetry Dashboard, and you cannot filter the data that is sent by Office Telemetry Agent.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_OfficeOSMCustomTags;L_OfficeOSMCustomTagsTag1","uniqueId":2849,"displayName":"Tag 1:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^.{1,64}$","validationFailErrorText":"Please enter a value less than 64 characters."},"dataType":"String"},"description":"This policy setting allows you to add custom tags to the Office telemetry data that is sent by Office Telemetry Agent.\n\nIf you enable this policy setting, the specified custom tags are shown in Office Telemetry Dashboard, where you can filter the collected data by the tag name. You can specify any string that you want to categorize and filter the collected data (for example, department name, title of user, and so forth).\n\nIf you disable or do not configure this policy setting, no custom tags are shown in Office Telemetry Dashboard, and you cannot filter the data that is sent by Office Telemetry Agent.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm","registrySubPath":"tag1","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_OfficeOSMCustomTags;L_OfficeOSMCustomTagsTag2","uniqueId":2850,"displayName":"Tag 2:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^.{1,64}$","validationFailErrorText":"Please enter a value less than 64 characters."},"dataType":"String"},"description":"This policy setting allows you to add custom tags to the Office telemetry data that is sent by Office Telemetry Agent.\n\nIf you enable this policy setting, the specified custom tags are shown in Office Telemetry Dashboard, where you can filter the collected data by the tag name. You can specify any string that you want to categorize and filter the collected data (for example, department name, title of user, and so forth).\n\nIf you disable or do not configure this policy setting, no custom tags are shown in Office Telemetry Dashboard, and you cannot filter the data that is sent by Office Telemetry Agent.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm","registrySubPath":"tag2","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_OfficeOSMCustomTags;L_OfficeOSMCustomTagsTag3","uniqueId":2851,"displayName":"Tag 3:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^.{1,64}$","validationFailErrorText":"Please enter a value less than 64 characters."},"dataType":"String"},"description":"This policy setting allows you to add custom tags to the Office telemetry data that is sent by Office Telemetry Agent.\n\nIf you enable this policy setting, the specified custom tags are shown in Office Telemetry Dashboard, where you can filter the collected data by the tag name. You can specify any string that you want to categorize and filter the collected data (for example, department name, title of user, and so forth).\n\nIf you disable or do not configure this policy setting, no custom tags are shown in Office Telemetry Dashboard, and you cannot filter the data that is sent by Office Telemetry Agent.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm","registrySubPath":"tag3","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_OfficeOSMCustomTags;L_OfficeOSMCustomTagsTag4","uniqueId":2852,"displayName":"Tag 4:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^.{1,64}$","validationFailErrorText":"Please enter a value less than 64 characters."},"dataType":"String"},"description":"This policy setting allows you to add custom tags to the Office telemetry data that is sent by Office Telemetry Agent.\n\nIf you enable this policy setting, the specified custom tags are shown in Office Telemetry Dashboard, where you can filter the collected data by the tag name. You can specify any string that you want to categorize and filter the collected data (for example, department name, title of user, and so forth).\n\nIf you disable or do not configure this policy setting, no custom tags are shown in Office Telemetry Dashboard, and you cannot filter the data that is sent by Office Telemetry Agent.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm","registrySubPath":"tag4","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_OfficeOSMPreventedHostApplications","uniqueId":2869,"displayName":"Office applications to exclude from Office Telemetry Agent reporting","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_OfficeOSMPreventedHostApplications;L_OfficeOSMPreventedHostApplicationsWord","logicalOperator":"exists","values":null},{"dependee":"office16;L_OfficeOSMPreventedHostApplications;L_OfficeOSMPreventedHostApplicationsExcel","logicalOperator":"exists","values":null},{"dependee":"office16;L_OfficeOSMPreventedHostApplications;L_OfficeOSMPreventedHostApplicationsPowerPoint","logicalOperator":"exists","values":null},{"dependee":"office16;L_OfficeOSMPreventedHostApplications;L_OfficeOSMPreventedHostApplicationsOutlook","logicalOperator":"exists","values":null},{"dependee":"office16;L_OfficeOSMPreventedHostApplications;L_OfficeOSMPreventedHostApplicationsAccess","logicalOperator":"exists","values":null},{"dependee":"office16;L_OfficeOSMPreventedHostApplications;L_OfficeOSMPreventedHostApplicationsProject","logicalOperator":"exists","values":null},{"dependee":"office16;L_OfficeOSMPreventedHostApplications;L_OfficeOSMPreventedHostApplicationsPublisher","logicalOperator":"exists","values":null},{"dependee":"office16;L_OfficeOSMPreventedHostApplications;L_OfficeOSMPreventedHostApplicationsVisio","logicalOperator":"exists","values":null},{"dependee":"office16;L_OfficeOSMPreventedHostApplications;L_OfficeOSMPreventedHostApplicationsOneNote","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to prevent telemetry data for Office applications from being reported to Office Telemetry Dashboard.\n\nIf you enable this policy setting, Office Telemetry Agent does not upload telemetry data for the specified Office applications to Office Telemetry Dashboard.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent uploads telemetry data for all Office applications.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_OfficeOSMPreventedHostApplications;L_OfficeOSMPreventedHostApplicationsAccess","uniqueId":2864,"displayName":"Access-related solutions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to prevent telemetry data for Office applications from being reported to Office Telemetry Dashboard.\n\nIf you enable this policy setting, Office Telemetry Agent does not upload telemetry data for the specified Office applications to Office Telemetry Dashboard.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent uploads telemetry data for all Office applications.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm\\preventedapplications","registrySubPath":"accesssolution","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeOSMPreventedHostApplications;L_OfficeOSMPreventedHostApplicationsExcel","uniqueId":2861,"displayName":"Excel-related solutions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to prevent telemetry data for Office applications from being reported to Office Telemetry Dashboard.\n\nIf you enable this policy setting, Office Telemetry Agent does not upload telemetry data for the specified Office applications to Office Telemetry Dashboard.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent uploads telemetry data for all Office applications.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm\\preventedapplications","registrySubPath":"xlsolution","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeOSMPreventedHostApplications;L_OfficeOSMPreventedHostApplicationsOneNote","uniqueId":2868,"displayName":"OneNote-related solutions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to prevent telemetry data for Office applications from being reported to Office Telemetry Dashboard.\n\nIf you enable this policy setting, Office Telemetry Agent does not upload telemetry data for the specified Office applications to Office Telemetry Dashboard.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent uploads telemetry data for all Office applications.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm\\preventedapplications","registrySubPath":"onenotesolution","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeOSMPreventedHostApplications;L_OfficeOSMPreventedHostApplicationsOutlook","uniqueId":2863,"displayName":"Outlook-related solutions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to prevent telemetry data for Office applications from being reported to Office Telemetry Dashboard.\n\nIf you enable this policy setting, Office Telemetry Agent does not upload telemetry data for the specified Office applications to Office Telemetry Dashboard.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent uploads telemetry data for all Office applications.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm\\preventedapplications","registrySubPath":"olksolution","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeOSMPreventedHostApplications;L_OfficeOSMPreventedHostApplicationsPowerPoint","uniqueId":2862,"displayName":"PowerPoint-related solutions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to prevent telemetry data for Office applications from being reported to Office Telemetry Dashboard.\n\nIf you enable this policy setting, Office Telemetry Agent does not upload telemetry data for the specified Office applications to Office Telemetry Dashboard.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent uploads telemetry data for all Office applications.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm\\preventedapplications","registrySubPath":"pptsolution","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeOSMPreventedHostApplications;L_OfficeOSMPreventedHostApplicationsProject","uniqueId":2865,"displayName":"Project-related solutions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to prevent telemetry data for Office applications from being reported to Office Telemetry Dashboard.\n\nIf you enable this policy setting, Office Telemetry Agent does not upload telemetry data for the specified Office applications to Office Telemetry Dashboard.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent uploads telemetry data for all Office applications.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm\\preventedapplications","registrySubPath":"projectsolution","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeOSMPreventedHostApplications;L_OfficeOSMPreventedHostApplicationsPublisher","uniqueId":2866,"displayName":"Publisher-related solutions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to prevent telemetry data for Office applications from being reported to Office Telemetry Dashboard.\n\nIf you enable this policy setting, Office Telemetry Agent does not upload telemetry data for the specified Office applications to Office Telemetry Dashboard.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent uploads telemetry data for all Office applications.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm\\preventedapplications","registrySubPath":"publishersolution","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeOSMPreventedHostApplications;L_OfficeOSMPreventedHostApplicationsVisio","uniqueId":2867,"displayName":"Visio-related solutions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to prevent telemetry data for Office applications from being reported to Office Telemetry Dashboard.\n\nIf you enable this policy setting, Office Telemetry Agent does not upload telemetry data for the specified Office applications to Office Telemetry Dashboard.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent uploads telemetry data for all Office applications.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm\\preventedapplications","registrySubPath":"visiosolution","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeOSMPreventedHostApplications;L_OfficeOSMPreventedHostApplicationsWord","uniqueId":2860,"displayName":"Word-related solutions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to prevent telemetry data for Office applications from being reported to Office Telemetry Dashboard.\n\nIf you enable this policy setting, Office Telemetry Agent does not upload telemetry data for the specified Office applications to Office Telemetry Dashboard.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent uploads telemetry data for all Office applications.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm\\preventedapplications","registrySubPath":"wdsolution","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeOSMPreventedSolutionTypes","uniqueId":2859,"displayName":"Office solutions to exclude from Office Telemetry Agent reporting","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_OfficeOSMPreventedSolutionTypes;L_OfficeOSMPreventedSolutionTypesDocumentFiles","logicalOperator":"exists","values":null},{"dependee":"office16;L_OfficeOSMPreventedSolutionTypes;L_OfficeOSMPreventedSolutionTypesTemplateFiles","logicalOperator":"exists","values":null},{"dependee":"office16;L_OfficeOSMPreventedSolutionTypes;L_OfficeOSMPreventedSolutionTypesCOMAddins","logicalOperator":"exists","values":null},{"dependee":"office16;L_OfficeOSMPreventedSolutionTypes;L_OfficeOSMPreventedSolutionTypesAppAddins","logicalOperator":"exists","values":null},{"dependee":"office16;L_OfficeOSMPreventedSolutionTypes;L_OfficeOSMPreventedSolutionTypesAgave","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to prevent telemetry data for Office solutions from being reported to Office Telemetry Dashboard.\n\nIf you enable this policy setting, Office Telemetry Agent does not upload telemetry data for the specified Office solutions to Office Telemetry Dashboard.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent uploads telemetry data for all available solution types.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_OfficeOSMPreventedSolutionTypes;L_OfficeOSMPreventedSolutionTypesAgave","uniqueId":2858,"displayName":"Web Add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to prevent telemetry data for Office solutions from being reported to Office Telemetry Dashboard.\n\nIf you enable this policy setting, Office Telemetry Agent does not upload telemetry data for the specified Office solutions to Office Telemetry Dashboard.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent uploads telemetry data for all available solution types.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm\\preventedsolutiontypes","registrySubPath":"agave","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeOSMPreventedSolutionTypes;L_OfficeOSMPreventedSolutionTypesAppAddins","uniqueId":2857,"displayName":"Application-specific add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to prevent telemetry data for Office solutions from being reported to Office Telemetry Dashboard.\n\nIf you enable this policy setting, Office Telemetry Agent does not upload telemetry data for the specified Office solutions to Office Telemetry Dashboard.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent uploads telemetry data for all available solution types.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm\\preventedsolutiontypes","registrySubPath":"appaddins","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeOSMPreventedSolutionTypes;L_OfficeOSMPreventedSolutionTypesCOMAddins","uniqueId":2856,"displayName":"COM add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to prevent telemetry data for Office solutions from being reported to Office Telemetry Dashboard.\n\nIf you enable this policy setting, Office Telemetry Agent does not upload telemetry data for the specified Office solutions to Office Telemetry Dashboard.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent uploads telemetry data for all available solution types.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm\\preventedsolutiontypes","registrySubPath":"comaddins","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeOSMPreventedSolutionTypes;L_OfficeOSMPreventedSolutionTypesDocumentFiles","uniqueId":2854,"displayName":"Office document files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to prevent telemetry data for Office solutions from being reported to Office Telemetry Dashboard.\n\nIf you enable this policy setting, Office Telemetry Agent does not upload telemetry data for the specified Office solutions to Office Telemetry Dashboard.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent uploads telemetry data for all available solution types.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm\\preventedsolutiontypes","registrySubPath":"documentfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeOSMPreventedSolutionTypes;L_OfficeOSMPreventedSolutionTypesTemplateFiles","uniqueId":2855,"displayName":"Office template files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to prevent telemetry data for Office solutions from being reported to Office Telemetry Dashboard.\n\nIf you enable this policy setting, Office Telemetry Agent does not upload telemetry data for the specified Office solutions to Office Telemetry Dashboard.\n\nIf you disable or do not configure this policy setting, Office Telemetry Agent uploads telemetry data for all available solution types.","supportedPlatforms":["Windows"],"tags":["Telemetry Dashboard","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\osm\\preventedsolutiontypes","registrySubPath":"templatefiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeReadinessToolkitCustomTags","uniqueId":2942,"displayName":"Specify custom labels to use with the Readiness Toolkit","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_OfficeReadinessToolkitCustomTags;L_OfficeReadinessToolkitCustomTagsTag1","logicalOperator":"exists","values":null},{"dependee":"office16;L_OfficeReadinessToolkitCustomTags;L_OfficeReadinessToolkitCustomTagsTag2","logicalOperator":"exists","values":null},{"dependee":"office16;L_OfficeReadinessToolkitCustomTags;L_OfficeReadinessToolkitCustomTagsTag3","logicalOperator":"exists","values":null},{"dependee":"office16;L_OfficeReadinessToolkitCustomTags;L_OfficeReadinessToolkitCustomTagsTag4","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify up to four custom labels to categorize and filter data in reports created by the Readiness Toolkit for Office. Labels are available in reports that are based on scans of the most recently used Office documents and installed add-ins on the user’s computer.\n\nYou can specify any string for the custom labels. For example, you can use a label to indicate the user’s department, title, or geographic location. When the Readiness Toolkit runs on the user’s computer, the custom labels are collected and are made available in the reports that are created. For example, you can filter the report to show only data from the Finance Department. Assign labels in a consistent manner, such as always using Label 1 for department.\n\nIf you enable this policy setting, the custom labels that you specify will be available in reports created by the Readiness Toolkit.\n\nIf you disable or don’t configure this policy setting, custom labels won’t be available in reports created by the Readiness Toolkit.\n\nNote: If you're using the Office Telemetry Dashboard and have already configured tags (labels), the Readiness Toolkit automatically collects those labels during its scan of the user's computer and will make them available in its reports. You don't need to enable this policy setting unless you want to specify different labels. Labels you specify for the Readiness Toolkit won't appear in the Office Telemetry Dashboard.","supportedPlatforms":["Windows"],"tags":["Readiness Toolkit","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_OfficeReadinessToolkitCustomTags;L_OfficeReadinessToolkitCustomTagsTag1","uniqueId":2938,"displayName":"Label 1:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^.{1,64}$","validationFailErrorText":"Please enter a value less than 64 characters."},"dataType":"String"},"description":"This policy setting allows you to specify up to four custom labels to categorize and filter data in reports created by the Readiness Toolkit for Office. Labels are available in reports that are based on scans of the most recently used Office documents and installed add-ins on the user’s computer.\n\nYou can specify any string for the custom labels. For example, you can use a label to indicate the user’s department, title, or geographic location. When the Readiness Toolkit runs on the user’s computer, the custom labels are collected and are made available in the reports that are created. For example, you can filter the report to show only data from the Finance Department. Assign labels in a consistent manner, such as always using Label 1 for department.\n\nIf you enable this policy setting, the custom labels that you specify will be available in reports created by the Readiness Toolkit.\n\nIf you disable or don’t configure this policy setting, custom labels won’t be available in reports created by the Readiness Toolkit.\n\nNote: If you're using the Office Telemetry Dashboard and have already configured tags (labels), the Readiness Toolkit automatically collects those labels during its scan of the user's computer and will make them available in its reports. You don't need to enable this policy setting unless you want to specify different labels. Labels you specify for the Readiness Toolkit won't appear in the Office Telemetry Dashboard.","supportedPlatforms":["Windows"],"tags":["Readiness Toolkit","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\readinesstoolkit","registrySubPath":"tag1","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_OfficeReadinessToolkitCustomTags;L_OfficeReadinessToolkitCustomTagsTag2","uniqueId":2939,"displayName":"Label 2:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^.{1,64}$","validationFailErrorText":"Please enter a value less than 64 characters."},"dataType":"String"},"description":"This policy setting allows you to specify up to four custom labels to categorize and filter data in reports created by the Readiness Toolkit for Office. Labels are available in reports that are based on scans of the most recently used Office documents and installed add-ins on the user’s computer.\n\nYou can specify any string for the custom labels. For example, you can use a label to indicate the user’s department, title, or geographic location. When the Readiness Toolkit runs on the user’s computer, the custom labels are collected and are made available in the reports that are created. For example, you can filter the report to show only data from the Finance Department. Assign labels in a consistent manner, such as always using Label 1 for department.\n\nIf you enable this policy setting, the custom labels that you specify will be available in reports created by the Readiness Toolkit.\n\nIf you disable or don’t configure this policy setting, custom labels won’t be available in reports created by the Readiness Toolkit.\n\nNote: If you're using the Office Telemetry Dashboard and have already configured tags (labels), the Readiness Toolkit automatically collects those labels during its scan of the user's computer and will make them available in its reports. You don't need to enable this policy setting unless you want to specify different labels. Labels you specify for the Readiness Toolkit won't appear in the Office Telemetry Dashboard.","supportedPlatforms":["Windows"],"tags":["Readiness Toolkit","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\readinesstoolkit","registrySubPath":"tag2","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_OfficeReadinessToolkitCustomTags;L_OfficeReadinessToolkitCustomTagsTag3","uniqueId":2940,"displayName":"Label 3:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^.{1,64}$","validationFailErrorText":"Please enter a value less than 64 characters."},"dataType":"String"},"description":"This policy setting allows you to specify up to four custom labels to categorize and filter data in reports created by the Readiness Toolkit for Office. Labels are available in reports that are based on scans of the most recently used Office documents and installed add-ins on the user’s computer.\n\nYou can specify any string for the custom labels. For example, you can use a label to indicate the user’s department, title, or geographic location. When the Readiness Toolkit runs on the user’s computer, the custom labels are collected and are made available in the reports that are created. For example, you can filter the report to show only data from the Finance Department. Assign labels in a consistent manner, such as always using Label 1 for department.\n\nIf you enable this policy setting, the custom labels that you specify will be available in reports created by the Readiness Toolkit.\n\nIf you disable or don’t configure this policy setting, custom labels won’t be available in reports created by the Readiness Toolkit.\n\nNote: If you're using the Office Telemetry Dashboard and have already configured tags (labels), the Readiness Toolkit automatically collects those labels during its scan of the user's computer and will make them available in its reports. You don't need to enable this policy setting unless you want to specify different labels. Labels you specify for the Readiness Toolkit won't appear in the Office Telemetry Dashboard.","supportedPlatforms":["Windows"],"tags":["Readiness Toolkit","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\readinesstoolkit","registrySubPath":"tag3","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_OfficeReadinessToolkitCustomTags;L_OfficeReadinessToolkitCustomTagsTag4","uniqueId":2941,"displayName":"Label 4:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^.{1,64}$","validationFailErrorText":"Please enter a value less than 64 characters."},"dataType":"String"},"description":"This policy setting allows you to specify up to four custom labels to categorize and filter data in reports created by the Readiness Toolkit for Office. Labels are available in reports that are based on scans of the most recently used Office documents and installed add-ins on the user’s computer.\n\nYou can specify any string for the custom labels. For example, you can use a label to indicate the user’s department, title, or geographic location. When the Readiness Toolkit runs on the user’s computer, the custom labels are collected and are made available in the reports that are created. For example, you can filter the report to show only data from the Finance Department. Assign labels in a consistent manner, such as always using Label 1 for department.\n\nIf you enable this policy setting, the custom labels that you specify will be available in reports created by the Readiness Toolkit.\n\nIf you disable or don’t configure this policy setting, custom labels won’t be available in reports created by the Readiness Toolkit.\n\nNote: If you're using the Office Telemetry Dashboard and have already configured tags (labels), the Readiness Toolkit automatically collects those labels during its scan of the user's computer and will make them available in its reports. You don't need to enable this policy setting unless you want to specify different labels. Labels you specify for the Readiness Toolkit won't appear in the Office Telemetry Dashboard.","supportedPlatforms":["Windows"],"tags":["Readiness Toolkit","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\readinesstoolkit","registrySubPath":"tag4","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_OfficeReadinessToolkitEnableUsageAgent","uniqueId":2937,"displayName":"Allow add-in usage data to be generated and collected by the Readiness Toolkit","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to configure whether the Readiness Toolkit for Office generates and collects add-in usage data. The data generated and collected includes when the add-in is loaded and used, and if the add-in crashes. This information is available in reports provided by the Readiness Toolkit.\n\nIf you enable this policy setting, the Readiness Toolkit generates and collects add-in usage data.\n\nIf you disable or don't configure this policy setting, the Readiness Toolkit doesn't generate or collect add-in usage data.","supportedPlatforms":["Windows"],"tags":["Readiness Toolkit","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\readinesstoolkit","registrySubPath":"enableusageagent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeRecommendedDocuments","uniqueId":2974,"displayName":"Show recommended files on the File tab or start page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether users see a list of recommended files on the File tab or start page in Word, Excel, and PowerPoint, on devices running Windows.\n\nIf you enable this policy setting, users will see a list of recommended files on the File tab or start page.\n\nIf you disable this policy setting, users won't see a list of recommended files on the File tab or start page.\n\nIf you don't configure this policy setting, users will see a list of recommended files on the File tab or start page.\n\nFor more information, see https://go.microsoft.com/fwlink/p/?linkid=2146780.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n      ","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"recommendeddocumentsenabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeScriptsExcel","uniqueId":5372,"displayName":"Let users automate their tasks in Excel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users in your organization can use Office Scripts to automate tasks in Excel.\n\nIf you enable or don’t configure this policy setting, users can create, edit, and run Office Scripts in Excel.\n\nIf you disable this policy setting, users won’t be able to access or use Office Scripts in Excel.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for Enterprise.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["OfficeScriptsExcel","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\scripts","registrySubPath":"OfficeScriptsExcel","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeScriptsPowerAutomate","uniqueId":5373,"displayName":"Let users with access to Office Scripts run their scripts with Power Automate","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can run their Office Scripts through Power Automate flows without requiring direct user interaction.\n\nIf you enable or don’t configure this policy setting, users can integrate Office Scripts into automated workflows using Power Automate, allowing for unattended script execution.\n\nIf you disable this policy setting, users won’t be able to run Office Scripts through Power Automate, and scripts will require manual execution within Excel on the web.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for Enterprise.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["OfficeScriptsPowerAutomate","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\scripts","registrySubPath":"OfficeScriptsPowerAutomate","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfficeScriptsSharing","uniqueId":5374,"displayName":"Let users with access to Office Scripts share their scripts with others in the organization","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can share their Office Scripts with others in your organization.\n\nIf you enable or don’t configure this policy setting, users can share their scripts with others, allowing collaboration and reuse.\n\nIf you disable this policy setting, users won’t be able to share their Office Scripts with others in the organization.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for Enterprise.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["OfficeScriptsSharing","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\scripts","registrySubPath":"OfficeScriptsSharing","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfflineModeforDocumentInformationPanel;L_empty422","uniqueId":2533,"displayName":"Offline Mode for Document Information Panel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable Offline Mode","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable Offline Mode, work offline now","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable Offline Mode","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Specify if Offline Mode is disabled/enabled for custom Document Information Panel templates and if the Document Information Panel is currently in Offline Mode.","supportedPlatforms":["Windows"],"tags":["Document Information Panel","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\documentinformationpanel","registrySubPath":"msoridxdocsppcachedmodestatus","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OfflineModeforDocumentInformationPanel","uniqueId":2534,"displayName":"Offline Mode for Document Information Panel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_OfflineModeforDocumentInformationPanel;L_empty422","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specify if Offline Mode is disabled/enabled for custom Document Information Panel templates and if the Document Information Panel is currently in Offline Mode.","supportedPlatforms":["Windows"],"tags":["Document Information Panel","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Onlinecontentoptions","uniqueId":1676,"displayName":"Online Content Options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Onlinecontentoptions;L_onlinecontentoptions236","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls users' access to the online features of Office 2016.\n\nIf you enable this policy setting, you can choose one of two options for user access to online content and services:\n\n* Do not allow Office to connect to the Internet – Office applications do not connect to the Internet to access online services, or to download the latest online content from Office.com. Connected features of Office 2016 are disabled.\n\n* Allow Office to connect to the Internet – Office applications use online services and download the latest online content from Office.com when users’ computers are connected to the Internet. Connected features of Office 2016 are enabled. This option enforces the default configuration.\n\nIf you disable this policy setting or do not configure this policy setting, Office applications use online services and download the latest online content from Office.com when users’ computers are connected to the Internet. Users can change this behavior by deselecting the \"Allow Office to connect to the Internet\" checkbox in the Privacy Options section of the Trust Center.","supportedPlatforms":["Windows"],"tags":["Online Content","Tools | Options | General | Service Options...","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Onlinecontentoptions;L_onlinecontentoptions236","uniqueId":1675,"displayName":"Online content options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not allow Office to connect to the Internet","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow Office to connect to the Internet","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls users' access to the online features of Office 2016.\n\nIf you enable this policy setting, you can choose one of two options for user access to online content and services:\n\n* Do not allow Office to connect to the Internet – Office applications do not connect to the Internet to access online services, or to download the latest online content from Office.com. Connected features of Office 2016 are disabled.\n\n* Allow Office to connect to the Internet – Office applications use online services and download the latest online content from Office.com when users’ computers are connected to the Internet. Connected features of Office 2016 are enabled. This option enforces the default configuration.\n\nIf you disable this policy setting or do not configure this policy setting, Office applications use online services and download the latest online content from Office.com when users’ computers are connected to the Internet. Users can change this behavior by deselecting the \"Allow Office to connect to the Internet\" checkbox in the Privacy Options section of the Trust Center.","supportedPlatforms":["Windows"],"tags":["Online Content","Tools | Options | General | Service Options...","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"useonlinecontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OnlineStorageFilter","uniqueId":2902,"displayName":"Hide Microsoft cloud-based file locations in the Backstage view","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_OnlineStorageFilter;L_OnlineStorageFilterID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to hide Microsoft cloud-based file locations in the Backstage view in Office. This helps prevent users from opening, saving, or sharing cloud-based files to locations such as: OneDrive, SharePoint, or Third Party Services.\n\nThis policy setting only applies to Word, PowerPoint, and Excel.\n\nTo filter specific services, add the values for all services to be disabled:\n    1 - OneDrive Personal\n    4 - ThisPC\n    8 - SharePoint OnPrem\n    16 - Recent Places\n    32 - SharePoint\n    64 - OneDrive for Business\n    128 - Third Party Services\n\nSpecial Values:\n    0 - (Default) All services enabled.\n    2 - (Legacy Value) Disable SharePoint and OneDrive for Business.\n\t4294967295 - All optional services disabled.\n\nFor example, OneDrive Personal (1), This PC (4) and Third Party Services (128) can all be disabled with a value of 133.\n\nThis value is calculated as follows: 1 + 4 + 128 = 133\n\nCommon Setting Values:\n 1 - Disable OneDrive Personal\n 2 - Disable SharePoint Online and OneDrive for Business\n 3 - Disable SharePoint Online, OneDrive for Business, and OneDrive Personal\n\nIf you disable or don’t configure this policy setting, users can use any configured Microsoft cloud-based file location to open, save, and share files.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_OnlineStorageFilter;L_OnlineStorageFilterID","uniqueId":2901,"displayName":"Online Storage Filter Value:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":4294967295},"dataType":"Integer"},"defaultValue":"0","description":"This policy setting allows you to hide Microsoft cloud-based file locations in the Backstage view in Office. This helps prevent users from opening, saving, or sharing cloud-based files to locations such as: OneDrive, SharePoint, or Third Party Services.\n\nThis policy setting only applies to Word, PowerPoint, and Excel.\n\nTo filter specific services, add the values for all services to be disabled:\n    1 - OneDrive Personal\n    4 - ThisPC\n    8 - SharePoint OnPrem\n    16 - Recent Places\n    32 - SharePoint\n    64 - OneDrive for Business\n    128 - Third Party Services\n\nSpecial Values:\n    0 - (Default) All services enabled.\n    2 - (Legacy Value) Disable SharePoint and OneDrive for Business.\n\t4294967295 - All optional services disabled.\n\nFor example, OneDrive Personal (1), This PC (4) and Third Party Services (128) can all be disabled with a value of 133.\n\nThis value is calculated as follows: 1 + 4 + 128 = 133\n\nCommon Setting Values:\n 1 - Disable OneDrive Personal\n 2 - Disable SharePoint Online and OneDrive for Business\n 3 - Disable SharePoint Online, OneDrive for Business, and OneDrive Personal\n\nIf you disable or don’t configure this policy setting, users can use any configured Microsoft cloud-based file location to open, save, and share files.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"onlinestorage","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Onlycontainingalink","uniqueId":2425,"displayName":"Only containing a link","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Onlycontainingalink;L_onlycontainingalink357","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines the default message body text used in an email request for review when the review document is included only as an attachment.","supportedPlatforms":["Windows"],"tags":["Default message text for a review request...","Collaboration Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Onlycontainingalink;L_onlycontainingalink357","uniqueId":2424,"displayName":"Only containing a link","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Defines the default message body text used in an email request for review when the review document is included only as an attachment.","supportedPlatforms":["Windows"],"tags":["Default message text for a review request...","Collaboration Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\reviewcycle","registrySubPath":"linkbody","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_Onlycontaininganattachment","uniqueId":2423,"displayName":"Only containing an attachment","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Onlycontaininganattachment;L_onlycontaininganattachment356","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines the default message body text used in an email request for review when the review document is included only as an attachment.","supportedPlatforms":["Windows"],"tags":["Default message text for a review request...","Collaboration Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Onlycontaininganattachment;L_onlycontaininganattachment356","uniqueId":2422,"displayName":"Only containing an attachment","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Defines the default message body text used in an email request for review when the review document is included only as an attachment.","supportedPlatforms":["Windows"],"tags":["Default message text for a review request...","Collaboration Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\reviewcycle","registrySubPath":"attachmentbody","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_OnlyTrustVBASignatureV3","uniqueId":2965,"displayName":"Only trust VBA macros that use V3 signatures","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether only VBA macros that use V3 signatures can be trusted and run in the application.\n\nIf you enable this policy setting, only VBA macros that use V3 signatures can be trusted and run in the application.\n\nIf you enable this policy setting, we also recommend that you enable the “VBA Macro Notification Settings” policy setting for the application and then select the “Disable all except digitally signed macros” option.\n\nNote: Before enabling this policy setting, you should upgrade your existing VBA macros to use V3 signatures.\n\nIf you disable or don’t configure this policy setting, VBA macros signed with legacy signature schemes can be trusted and run in the application.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\vba\\security","registrySubPath":"onlytrustvbasignaturev3","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OpenDirectlyInApp","uniqueId":1549,"displayName":"Open Directly in Office Client Application","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy allows the admin to choose whether Office documents located on web servers open up directly in the App or go via the web browser","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"opendirectlyinapp","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OpenDocumentsFromOfficeDocumentCacheFirst","uniqueId":2526,"displayName":"Open documents from Office Document Cache first","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows the client application to open a document directly from the Office Document Cache if it is aware that the server the document resides on is not reachable. It may be useful in situations where you would like to wait to contact the server every time, time out and then fallback to the cache. \n\nIf you enable or do not configure this policy setting, documents will be opened directly from the Office Document Cache when the server the document resides on is not reachable. \n\nIf you disable this policy setting, Office will always attempt to first reach the server the document resides on before opening it from the Office Document Cache.","supportedPlatforms":["Windows"],"tags":["Microsoft Office Document Cache","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"disableserverreachability","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OpenOfficeDocumentDirectlyInOfficeApplication","uniqueId":1663,"displayName":"Open Office document directly in Office application","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to choose whether Office documents located on web servers open directly in the registered application or through the web browser. \n\nIf you enable this policy setting, files will open directly in the associated Office application, bypassing the web browser.\n\nIf you disable this policy setting files will open through the web browser.","supportedPlatforms":["Windows"],"tags":["Files","Tools | Options | General | Web Options...","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"opendirectlyinapp","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OpenOfficedocumentsasreadwritewhilebrowsing","uniqueId":1662,"displayName":"Open Office documents as read/write while browsing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can edit and save Office 2016 documents on Web servers that they have opened using Internet Explorer.\n      \nIf enable this policy setting, when users browse to an Office 2016 document on a Web server using Internet Explorer the appropriate application opens the file in read/write mode.\n\nIf you disable or do not configure this policy setting, when users browse to an Office 2016 document on a Web server using Internet Explorer, the appropriate application opens the file in read-only mode.","supportedPlatforms":["Windows"],"tags":["Files","Tools | Options | General | Web Options...","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"opendocumentsreadwritewhilebrowsing","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OptionalConnectedExperiences","uniqueId":2951,"displayName":"Allow the use of additional optional connected experiences in Office","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy setting allows you to control whether additional optional connected experiences are available to your users when they’re using Office.\n\nAdditional optional connected experiences are offered by Microsoft directly to your users and are governed by terms other than your organization’s commercial agreement with Microsoft.\n\nInserting an online video into a PowerPoint presentation or the 3D Maps feature in Excel, which uses Bing, are examples of additional optional connected experiences.\n\nNote: Even if you choose to make these additional optional connected experiences available to your users, your users will have the option to turn these additional optional connected experiences off as a group by going to File > Account > Account Privacy > Manage Settings.\n\nIf you enable this policy setting, additional optional connected experiences will be available to your users.\n\nIf you disable this policy setting, additional optional connected experiences won’t be available to your users.\n\nNote: Some additional optional connected experiences may be controlled by other policy settings instead of this policy setting. For more information, see the link below.\n\nIf you don’t configure this policy setting, additional optional connected experiences will be available to your users.\n\nNote: If you disable the “Allow the use of connected experiences in Office” policy setting, additional optional connected experiences won’t be available to your users.\n\nFor more information, see https://go.microsoft.com/fwlink/p/?linkid=2085690\n\nNote: For information about how this policy setting affects Microsoft 365 Copilot, see https://go.microsoft.com/fwlink/p/?linkid=2248196.","supportedPlatforms":["Windows","Web","Mac","iOS","Android"],"tags":["Trust Center","Privacy","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies","Copilot","AnonymousPolicyAssignment"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\privacy","registrySubPath":"controllerconnectedservicesenabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Organizesupportingfilesinafolder","uniqueId":1658,"displayName":"Organize supporting files in a folder","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This will be forced on if 'Use long file names' is forced off.","supportedPlatforms":["Windows"],"tags":["Files","Tools | Options | General | Web Options...","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"donotorganizeinfolder","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Oromo","uniqueId":2198,"displayName":"Oromo","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Oromo","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"om-et","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OutlookAdhocreviewing;L_empty400","uniqueId":2457,"displayName":"Outlook: Ad hoc reviewing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable ad hoc reviewing","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Exclude author's e-mail in documents","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable ad hoc reviewing","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"\"Enable ad hoc reviewing\": Enables the ad-hoc review feature. | \"Exclude author's e-mail in documents\": Enables the ad-hoc review feature, but the authors e-mail is not recorded on the sent document. | \"Disable ad hoc reviewing\": Disables the ad-hoc review feature.","supportedPlatforms":["Windows"],"tags":["Collaboration Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"adhocreviewbehavior","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_OutlookAdhocreviewing","uniqueId":2458,"displayName":"Outlook: Ad hoc reviewing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_OutlookAdhocreviewing;L_empty400","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\"Enable ad hoc reviewing\": Enables the ad-hoc review feature. | \"Exclude author's e-mail in documents\": Enables the ad-hoc review feature, but the authors e-mail is not recorded on the sent document. | \"Disable ad hoc reviewing\": Disables the ad-hoc review feature.","supportedPlatforms":["Windows"],"tags":["Collaboration Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Outlooksendforreview;L_empty399","uniqueId":2455,"displayName":"Outlook: 'send for review'","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable 'send for review'","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Exclude author's e-mail in documents","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable 'send for review'","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"\"Enable 'send for review\"': Enables the Send For Review feature. | \"Exclude author's e-mail in documents\": Enables the Send For Review feature, but the authors e-mail is not recorded on the sent document. | \"Disable 'send for review\"': Disables the Send For Review feature.","supportedPlatforms":["Windows"],"tags":["Collaboration Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"explicitreviewbehavior","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Outlooksendforreview","uniqueId":2456,"displayName":"Outlook: 'send for review'","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Outlooksendforreview;L_empty399","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\"Enable 'send for review\"': Enables the Send For Review feature. | \"Exclude author's e-mail in documents\": Enables the Send For Review feature, but the authors e-mail is not recorded on the sent document. | \"Disable 'send for review\"': Disables the Send For Review feature.","supportedPlatforms":["Windows"],"tags":["Collaboration Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Papiamentu","uniqueId":2199,"displayName":"Papiamento","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Papiamento","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"pap-029","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Pashto","uniqueId":2200,"displayName":"Pashto","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Pashto","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ps-af","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_PDFProtectionFromOffice","uniqueId":2514,"displayName":"Use the Sensitivity feature in Office to apply sensitivity labels to PDFs","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether sensitivity labels powered by Microsoft Purview Information Protection are applied to PDFs created in Word, Excel, and PowerPoint.​\n\nIf you enable this policy setting or don’t configure it, PDFs will inherit the sensitivity label and encryption from the source Word, Excel, and PowerPoint document.\n\nIf you disable this policy setting, PDFs created in Word, Excel, and PowerPoint do not inherit their source file’s sensitivity labels and encryption. When the source file is encrypted, users who do not have the rights to remove protection cannot export to PDF.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise. For more information about this setting, see https://go.microsoft.com/fwlink/?linkid=2220953.","supportedPlatforms":["Windows"],"tags":["Microsoft Save As PDF and XPS add-ins","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\fixedformat","registrySubPath":"disablepdfprotection","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Persian","uniqueId":2201,"displayName":"Persian","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Persian","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"fa-ir","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_PersonalizationHomeUseProgram","uniqueId":2964,"displayName":"Show in-product notifications for the Microsoft Workplace Discount Program","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether notifications about the Workplace Discount Program (previously named the Home Use Program) are displayed to end-users in Office applications.\n\nIf you enable this policy setting, Office will occasionally notify end-users if they are eligible to purchase an Office subscription for their personal use at a discount via the Microsoft Workplace Discount Program. End-users can permanently opt-out of these notifications at any time using a button within the notification.\n\nIf you disable this policy setting, Office will not display any notifications related to the Microsoft Workplace Discount Program.\n\nIf you don't configure this policy setting, Microsoft will control whether or not these notifications appear. Please check the Message Center in the Microsoft 365 admin center for updates on whether this feature has been enabled by Microsoft yet and the default setting for the notifications.\n\nFor more information, see https://go.microsoft.com/fwlink/p/?linkid=2202543.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\personalization","registrySubPath":"homeuseprogram","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_PinningStateforCopilotApp","uniqueId":5375,"displayName":"Pin Copilot Chat in the Microsoft 365 Copilot App","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy setting allows you to control whether Microsoft 365 Copilot Chat is pinned to the navigation bar in the Microsoft 365 Copilot app. Pinning Copilot Chat ensures users have secure and consistent access to its generative AI capabilities while maintaining compliance within your organization. Copilot Chat used with EntraID is governed by your agreement for Online Services.\n\nIf you enable this policy setting, Copilot Chat will be pinned to the navigation bar in the Microsoft 365 Copilot app.\n\nIf you disable this policy setting, Copilot Chat will not be pinned to the navigation bar in the Microsoft 365 Copilot app for all tenants.\n\nIf you don't configure this policy setting, Copilot Chat will be pinned by default to the navigation bar in the Microsoft 365 Copilot App.\n\nFor more information, see the following articles:\n\nHelp users get started and be more productive with the Copilot Chat and agent starter kit https://adoption.microsoft.com/copilot/chat-and-agent-starter-kit\n\nLearn more about this setting https://learn.microsoft.com/copilot/manage\n\nNote: For US government GCC M, GCC H, and DoD customers, pinning policies do not apply and making any changes to this policy will not impact the visibility of Copilot in the navigation bars. If you wish to prevent access to Microsoft 365 Copilot Chat for your users, please refer to Manage Microsoft 365 Copilot Chat https://learn.microsoft.com/en-us/copilot/manage#remove-access-to--chat","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["Cloud Policies Boolean","PinningStateforCopilotApp","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"PinningStateforCopilotApp","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_PlacesBarLocationPolicy10","uniqueId":1629,"displayName":"Places Bar Location 10","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_PlacesBarLocationPolicy10;L_placesbarname227","logicalOperator":"exists","values":null},{"dependee":"office16;L_PlacesBarLocationPolicy10;L_placesbarpath228","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_PlacesBarLocationPolicy10;L_placesbarname227","uniqueId":1627,"displayName":"Name:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\adminaddedplaces\\place9","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_PlacesBarLocationPolicy10;L_placesbarpath228","uniqueId":1628,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\adminaddedplaces\\place9","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_PlacesBarLocationPolicy1","uniqueId":1602,"displayName":"Places Bar Location 1","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_PlacesBarLocationPolicy1;L_PlacesBarName","logicalOperator":"exists","values":null},{"dependee":"office16;L_PlacesBarLocationPolicy1;L_PlacesBarPath","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_PlacesBarLocationPolicy1;L_PlacesBarName","uniqueId":1600,"displayName":"Name:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\adminaddedplaces\\place0","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_PlacesBarLocationPolicy1;L_PlacesBarPath","uniqueId":1601,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\adminaddedplaces\\place0","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_PlacesBarLocationPolicy2","uniqueId":1605,"displayName":"Places Bar Location 2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_PlacesBarLocationPolicy2;L_placesbarname211","logicalOperator":"exists","values":null},{"dependee":"office16;L_PlacesBarLocationPolicy2;L_placesbarpath212","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_PlacesBarLocationPolicy2;L_placesbarname211","uniqueId":1603,"displayName":"Name:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\adminaddedplaces\\place1","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_PlacesBarLocationPolicy2;L_placesbarpath212","uniqueId":1604,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\adminaddedplaces\\place1","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_PlacesBarLocationPolicy3","uniqueId":1608,"displayName":"Places Bar Location 3","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_PlacesBarLocationPolicy3;L_placesbarname213","logicalOperator":"exists","values":null},{"dependee":"office16;L_PlacesBarLocationPolicy3;L_placesbarpath214","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_PlacesBarLocationPolicy3;L_placesbarname213","uniqueId":1606,"displayName":"Name:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\adminaddedplaces\\place2","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_PlacesBarLocationPolicy3;L_placesbarpath214","uniqueId":1607,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\adminaddedplaces\\place2","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_PlacesBarLocationPolicy4","uniqueId":1611,"displayName":"Places Bar Location 4","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_PlacesBarLocationPolicy4;L_placesbarname215","logicalOperator":"exists","values":null},{"dependee":"office16;L_PlacesBarLocationPolicy4;L_placesbarpath216","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_PlacesBarLocationPolicy4;L_placesbarname215","uniqueId":1609,"displayName":"Name:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\adminaddedplaces\\place3","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_PlacesBarLocationPolicy4;L_placesbarpath216","uniqueId":1610,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\adminaddedplaces\\place3","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_PlacesBarLocationPolicy5","uniqueId":1614,"displayName":"Places Bar Location 5","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_PlacesBarLocationPolicy5;L_placesbarname217","logicalOperator":"exists","values":null},{"dependee":"office16;L_PlacesBarLocationPolicy5;L_placesbarpath218","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_PlacesBarLocationPolicy5;L_placesbarname217","uniqueId":1612,"displayName":"Name:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\adminaddedplaces\\place4","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_PlacesBarLocationPolicy5;L_placesbarpath218","uniqueId":1613,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\adminaddedplaces\\place4","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_PlacesBarLocationPolicy6","uniqueId":1617,"displayName":"Places Bar Location 6","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_PlacesBarLocationPolicy6;L_placesbarname219","logicalOperator":"exists","values":null},{"dependee":"office16;L_PlacesBarLocationPolicy6;L_placesbarpath220","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_PlacesBarLocationPolicy6;L_placesbarname219","uniqueId":1615,"displayName":"Name:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\adminaddedplaces\\place5","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_PlacesBarLocationPolicy6;L_placesbarpath220","uniqueId":1616,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\adminaddedplaces\\place5","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_PlacesBarLocationPolicy7","uniqueId":1620,"displayName":"Places Bar Location 7","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_PlacesBarLocationPolicy7;L_placesbarname221","logicalOperator":"exists","values":null},{"dependee":"office16;L_PlacesBarLocationPolicy7;L_placesbarpath222","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_PlacesBarLocationPolicy7;L_placesbarname221","uniqueId":1618,"displayName":"Name:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\adminaddedplaces\\place6","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_PlacesBarLocationPolicy7;L_placesbarpath222","uniqueId":1619,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\adminaddedplaces\\place6","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_PlacesBarLocationPolicy8","uniqueId":1623,"displayName":"Places Bar Location 8","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_PlacesBarLocationPolicy8;L_placesbarname223","logicalOperator":"exists","values":null},{"dependee":"office16;L_PlacesBarLocationPolicy8;L_placesbarpath224","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_PlacesBarLocationPolicy8;L_placesbarname223","uniqueId":1621,"displayName":"Name:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\adminaddedplaces\\place7","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_PlacesBarLocationPolicy8;L_placesbarpath224","uniqueId":1622,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\adminaddedplaces\\place7","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_PlacesBarLocationPolicy9","uniqueId":1626,"displayName":"Places Bar Location 9","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_PlacesBarLocationPolicy9;L_placesbarname225","logicalOperator":"exists","values":null},{"dependee":"office16;L_PlacesBarLocationPolicy9;L_placesbarpath226","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_PlacesBarLocationPolicy9;L_placesbarname225","uniqueId":1624,"displayName":"Name:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\adminaddedplaces\\place8","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_PlacesBarLocationPolicy9;L_placesbarpath226","uniqueId":1625,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting configures the list of items displayed in the Places Bar of the Common File dialog boxes. Valid items include browseable paths and environment variables of the form %...%. Items will be displayed in the Places Bar in the order in which they are entered into the template.","supportedPlatforms":["Windows"],"tags":["Places Bar Locations","File Open/Save dialog box","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\open find\\adminaddedplaces\\place8","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_PolicyTipsEnabled","uniqueId":2895,"displayName":"Enable DLP on application boot","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether DLP executes on application boot.\n\nIf you enable this policy setting, DLP runs on application boot.\n\nIf you disable or do not configure this policy setting, DLP does not run on application boot.","supportedPlatforms":["Windows"],"tags":["DLP","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\dlp","registrySubPath":"policytipsenabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Polish","uniqueId":2202,"displayName":"Polish","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Polish","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"pl-pl","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_PortugueseBrazil","uniqueId":2203,"displayName":"Portuguese (Brazil)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Portuguese (Brazil)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"pt-br","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_PortuguesePortugal","uniqueId":2204,"displayName":"Portuguese (Portugal)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Portuguese (Portugal)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"pt-pt","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_PowerPointSaveanadditionalversionofthepresentationforolderbr","uniqueId":2467,"displayName":"PowerPoint: Save an additional version of the presentation for older browsers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checked: PowerPoint publishes Web Archive presentations that contain a version of the presentation that is compatible with older browsers. | Unchecked:  PowerPoint publishes Web Archive presentations that contain only the version of the presentation that is compatible with later browsers.","supportedPlatforms":["Windows"],"tags":["Web Archives","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\internet","registrySubPath":"allownonv4mhtml","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_PowerPointwebpageformatcompatibility","uniqueId":2469,"displayName":"PowerPoint:  web page format compatibility","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_PowerPointwebpageformatcompatibility;L_powerpointwebpageformatcompatibility406","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\"All browsers\": Save new PowerPoint web pages in a format that is compatible with all browsers. | \"Windows Internet Explorer 4.0 or later\": Save new PowerPoint web pages in a format that requires Windows Internet Explorer 4.0 or later. | \"Based on installed browsers\": Examine the browsers installed on the user's computer and save new PowerPoint web pages in the smallest possible format that is compatible with all of the installed browsers.","supportedPlatforms":["Windows"],"tags":["Web Archives","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_PowerPointwebpageformatcompatibility;L_powerpointwebpageformatcompatibility406","uniqueId":2468,"displayName":"PowerPoint:  web page format compatibility","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"All browsers","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Windows Internet Explorer 4.0 or later","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Based on installed browsers","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":2,"description":"\"All browsers\": Save new PowerPoint web pages in a format that is compatible with all browsers. | \"Windows Internet Explorer 4.0 or later\": Save new PowerPoint web pages in a format that requires Windows Internet Explorer 4.0 or later. | \"Based on installed browsers\": Examine the browsers installed on the user's computer and save new PowerPoint web pages in the smallest possible format that is compatible with all of the installed browsers.","supportedPlatforms":["Windows"],"tags":["Web Archives","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\internet","registrySubPath":"htmlversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_PreventAccessToUserSpecifiedServices","uniqueId":2721,"displayName":"Prevent users from adding online presentation services in PowerPoint and Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to prevent users from adding new or previously created presentation services to the list of online presentation services in PowerPoint and Word. These services appear when a user selects the More services link under Present Online on the Share tab in Backstage view.\n\nIf you enable or do not configure this policy setting, the More services link does not allow users to add a new presentation service. In addition, all services previously added by users are removed from the list.\n\nIf you disable this policy setting, the More Services link provides an option for users to add a new presentation service. In addition, the list of services previously added by users appears in the list of services.","supportedPlatforms":["Windows"],"tags":["Present Online","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\broadcast","registrySubPath":"disableothersoption","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Preventusersfromchangingpermissions","uniqueId":2486,"displayName":"Prevent users from changing permissions on rights managed content","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Office 2016 users can change permissions for content that is protected with Information Rights Management (IRM). \n\nThe Information Rights Management feature of Office 2016 allows individuals and administrators to specify access permissions to Word documents, Excel workbooks, PowerPoint presentations, InfoPath templates and forms, and Outlook e-mail messages. This functionality helps prevent sensitive information from being printed, forwarded, or copied by unauthorized people. \n\nIf you enable this policy setting, users can open and edit documents for which they have the appropriate permissions, but they cannot create new rights-managed content, add IRM to existing documents, change existing IRM permissions, or remove IRM from documents. \n\nIf you disable or do not configure this policy setting, Office 2016 users can add, remove, or change IRM permissions for documents if they are authorized to do so.","supportedPlatforms":["Windows"],"tags":["Manage Restricted Permissions","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\drm","registrySubPath":"disablecreation","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_PreventWordandExcelfromloadingmanagedcodeextensions","uniqueId":2013,"displayName":"Prevent Word and Excel from loading managed code extensions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to prevent Word 2016 and Excel 2016 from loading managed code extensions.\n\nIf you enable this policy setting, Word 2016 and Excel 2016 will not load managed code extensions.\n\nIf you disable or do not configure this policy setting, Word 2016 and Excel 2016 will load managed code extensions automatically.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\smart tag","registrySubPath":"disabledocumentassemblies","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_PrimaryEditingLanguage","uniqueId":2296,"displayName":"Primary Editing Language","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_PrimaryEditingLanguage;L_primaryeditinglanguage341","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines the editing options for Office 2016 programs.  In addition to configuring this setting, consider enabling the same language in the 'Enabled Editing Languages' policy node.  Please refer to the Office Resource Kit documentation for important information on setting the installed version of Microsoft Office.","supportedPlatforms":["Windows"],"tags":["Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_PrimaryEditingLanguage;L_primaryeditinglanguage341","uniqueId":2295,"displayName":"Primary Editing Language","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1078,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Afrikaans","description":"","tags":[],"dependencyGroup":null},{"value":1052,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Albanian","description":"","tags":[],"dependencyGroup":null},{"value":1156,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Alsatian","description":"","tags":[],"dependencyGroup":null},{"value":1118,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Amharic","description":"","tags":[],"dependencyGroup":null},{"value":5121,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic (Algeria)","description":"","tags":[],"dependencyGroup":null},{"value":15361,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic (Bahrain)","description":"","tags":[],"dependencyGroup":null},{"value":3073,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic (Egypt)","description":"","tags":[],"dependencyGroup":null},{"value":2049,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic (Iraq)","description":"","tags":[],"dependencyGroup":null},{"value":11265,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic (Jordan)","description":"","tags":[],"dependencyGroup":null},{"value":13313,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic (Kuwait)","description":"","tags":[],"dependencyGroup":null},{"value":12289,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic (Lebanon)","description":"","tags":[],"dependencyGroup":null},{"value":4097,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic (Libya)","description":"","tags":[],"dependencyGroup":null},{"value":6145,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic (Morocco)","description":"","tags":[],"dependencyGroup":null},{"value":8193,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic (Oman)","description":"","tags":[],"dependencyGroup":null},{"value":16385,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic (Qatar)","description":"","tags":[],"dependencyGroup":null},{"value":1025,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic (Saudi Arabia)","description":"","tags":[],"dependencyGroup":null},{"value":10241,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic (Syria)","description":"","tags":[],"dependencyGroup":null},{"value":7169,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic (Tunisia)","description":"","tags":[],"dependencyGroup":null},{"value":14337,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic (U.A.E.)","description":"","tags":[],"dependencyGroup":null},{"value":9217,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic (Yemen)","description":"","tags":[],"dependencyGroup":null},{"value":1067,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Armenian (Armenia)","description":"","tags":[],"dependencyGroup":null},{"value":1101,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Assamese (India)","description":"","tags":[],"dependencyGroup":null},{"value":2092,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Azerbaijani (Cyrillic)","description":"","tags":[],"dependencyGroup":null},{"value":1068,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Azerbaijani (Latin)","description":"","tags":[],"dependencyGroup":null},{"value":2117,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bangla (Bangladesh)","description":"","tags":[],"dependencyGroup":null},{"value":1093,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bangla (India)","description":"","tags":[],"dependencyGroup":null},{"value":1133,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bashkir","description":"","tags":[],"dependencyGroup":null},{"value":1069,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Basque","description":"","tags":[],"dependencyGroup":null},{"value":1059,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Belarusian","description":"","tags":[],"dependencyGroup":null},{"value":8218,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bosnian (Cyrillic, Bosnia and Herzegovina)","description":"","tags":[],"dependencyGroup":null},{"value":5146,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bosnian (Latin, Bosnia and Herzegovina)","description":"","tags":[],"dependencyGroup":null},{"value":1150,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Breton","description":"","tags":[],"dependencyGroup":null},{"value":1026,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bulgarian","description":"","tags":[],"dependencyGroup":null},{"value":1109,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Burmese","description":"","tags":[],"dependencyGroup":null},{"value":1027,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Catalan","description":"","tags":[],"dependencyGroup":null},{"value":1170,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Central Kurdish (Iraq)","description":"","tags":[],"dependencyGroup":null},{"value":1116,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cherokee","description":"","tags":[],"dependencyGroup":null},{"value":2052,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Chinese (China)","description":"","tags":[],"dependencyGroup":null},{"value":3076,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Chinese (Hong Kong S.A.R.)","description":"","tags":[],"dependencyGroup":null},{"value":5124,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Chinese (Macao S.A.R.)","description":"","tags":[],"dependencyGroup":null},{"value":4100,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Chinese (Singapore)","description":"","tags":[],"dependencyGroup":null},{"value":1028,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Chinese (Taiwan)","description":"","tags":[],"dependencyGroup":null},{"value":1155,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Corsican","description":"","tags":[],"dependencyGroup":null},{"value":4122,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Croatian (Bosnia and Herzegovina)","description":"","tags":[],"dependencyGroup":null},{"value":1050,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Croatian (Croatia)","description":"","tags":[],"dependencyGroup":null},{"value":1029,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Czech","description":"","tags":[],"dependencyGroup":null},{"value":1030,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Danish","description":"","tags":[],"dependencyGroup":null},{"value":1164,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dari","description":"","tags":[],"dependencyGroup":null},{"value":1125,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Divehi","description":"","tags":[],"dependencyGroup":null},{"value":2067,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dutch (Belgium)","description":"","tags":[],"dependencyGroup":null},{"value":1043,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dutch (Netherlands)","description":"","tags":[],"dependencyGroup":null},{"value":1126,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Edo","description":"","tags":[],"dependencyGroup":null},{"value":3081,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English (Australia)","description":"","tags":[],"dependencyGroup":null},{"value":10249,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English (Belize)","description":"","tags":[],"dependencyGroup":null},{"value":4105,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English (Canada)","description":"","tags":[],"dependencyGroup":null},{"value":9225,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English (Caribbean)","description":"","tags":[],"dependencyGroup":null},{"value":15369,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English (Hong Kong S.A.R.)","description":"","tags":[],"dependencyGroup":null},{"value":16393,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English (India)","description":"","tags":[],"dependencyGroup":null},{"value":14345,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English (Indonesia)","description":"","tags":[],"dependencyGroup":null},{"value":6153,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English (Ireland)","description":"","tags":[],"dependencyGroup":null},{"value":8201,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English (Jamaica)","description":"","tags":[],"dependencyGroup":null},{"value":17417,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English (Malaysia)","description":"","tags":[],"dependencyGroup":null},{"value":5129,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English (New Zealand)","description":"","tags":[],"dependencyGroup":null},{"value":13321,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English (Philippines)","description":"","tags":[],"dependencyGroup":null},{"value":18441,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English (Singapore)","description":"","tags":[],"dependencyGroup":null},{"value":7177,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English (South Africa)","description":"","tags":[],"dependencyGroup":null},{"value":11273,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English (Trinidad and Tobago)","description":"","tags":[],"dependencyGroup":null},{"value":2057,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English (U.K.)","description":"","tags":[],"dependencyGroup":null},{"value":1033,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English (U.S.)","description":"","tags":[],"dependencyGroup":null},{"value":12297,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English (Zimbabwe)","description":"","tags":[],"dependencyGroup":null},{"value":1061,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Estonian","description":"","tags":[],"dependencyGroup":null},{"value":1080,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Faeroese","description":"","tags":[],"dependencyGroup":null},{"value":1124,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Filipino","description":"","tags":[],"dependencyGroup":null},{"value":1035,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Finnish","description":"","tags":[],"dependencyGroup":null},{"value":2060,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"French (Belgium)","description":"","tags":[],"dependencyGroup":null},{"value":11276,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"French (Cameroon)","description":"","tags":[],"dependencyGroup":null},{"value":3084,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"French (Canada)","description":"","tags":[],"dependencyGroup":null},{"value":7180,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"French (Caribbean)","description":"","tags":[],"dependencyGroup":null},{"value":9228,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"French (Congo (DRC))","description":"","tags":[],"dependencyGroup":null},{"value":12300,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"French (Côte d'Ivoire)","description":"","tags":[],"dependencyGroup":null},{"value":1036,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"French (France)","description":"","tags":[],"dependencyGroup":null},{"value":15372,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"French (Haiti)","description":"","tags":[],"dependencyGroup":null},{"value":5132,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"French (Luxembourg)","description":"","tags":[],"dependencyGroup":null},{"value":13324,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"French (Mali)","description":"","tags":[],"dependencyGroup":null},{"value":6156,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"French (Monaco)","description":"","tags":[],"dependencyGroup":null},{"value":14348,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"French (Morocco)","description":"","tags":[],"dependencyGroup":null},{"value":8204,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"French (Reunion)","description":"","tags":[],"dependencyGroup":null},{"value":10252,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"French (Senegal)","description":"","tags":[],"dependencyGroup":null},{"value":4108,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"French (Switzerland)","description":"","tags":[],"dependencyGroup":null},{"value":1122,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Western Frisian (Netherlands)","description":"","tags":[],"dependencyGroup":null},{"value":1127,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Fulfulde","description":"","tags":[],"dependencyGroup":null},{"value":1169,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Scottish Gaelic (United Kingdom)","description":"","tags":[],"dependencyGroup":null},{"value":1110,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Galician","description":"","tags":[],"dependencyGroup":null},{"value":1079,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Georgian","description":"","tags":[],"dependencyGroup":null},{"value":3079,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"German (Austria)","description":"","tags":[],"dependencyGroup":null},{"value":1031,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"German (Germany)","description":"","tags":[],"dependencyGroup":null},{"value":5127,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"German (Liechtenstein)","description":"","tags":[],"dependencyGroup":null},{"value":4103,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"German (Luxembourg)","description":"","tags":[],"dependencyGroup":null},{"value":2055,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"German (Switzerland)","description":"","tags":[],"dependencyGroup":null},{"value":1032,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Greek","description":"","tags":[],"dependencyGroup":null},{"value":1135,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Greenlandic","description":"","tags":[],"dependencyGroup":null},{"value":1140,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Guarani","description":"","tags":[],"dependencyGroup":null},{"value":1095,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gujarati","description":"","tags":[],"dependencyGroup":null},{"value":1128,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hausa (Latin)","description":"","tags":[],"dependencyGroup":null},{"value":1141,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hawaiian","description":"","tags":[],"dependencyGroup":null},{"value":1037,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hebrew (Israel)","description":"","tags":[],"dependencyGroup":null},{"value":1081,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hindi","description":"","tags":[],"dependencyGroup":null},{"value":1038,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hungarian","description":"","tags":[],"dependencyGroup":null},{"value":1129,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Ibibio","description":"","tags":[],"dependencyGroup":null},{"value":1039,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Icelandic","description":"","tags":[],"dependencyGroup":null},{"value":1136,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Igbo","description":"","tags":[],"dependencyGroup":null},{"value":1057,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Indonesian","description":"","tags":[],"dependencyGroup":null},{"value":2141,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Inuktitut (Latin)","description":"","tags":[],"dependencyGroup":null},{"value":1117,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Inuktitut (Syllabics)","description":"","tags":[],"dependencyGroup":null},{"value":2108,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Irish (Ireland)","description":"","tags":[],"dependencyGroup":null},{"value":1077,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"isiZulu","description":"","tags":[],"dependencyGroup":null},{"value":1076,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"isiXhosa","description":"","tags":[],"dependencyGroup":null},{"value":1040,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Italian (Italy)","description":"","tags":[],"dependencyGroup":null},{"value":2064,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Italian (Switzerland)","description":"","tags":[],"dependencyGroup":null},{"value":1041,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Japanese","description":"","tags":[],"dependencyGroup":null},{"value":1099,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kannada","description":"","tags":[],"dependencyGroup":null},{"value":1137,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kanuri","description":"","tags":[],"dependencyGroup":null},{"value":1120,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kashmiri (Arabic)","description":"","tags":[],"dependencyGroup":null},{"value":2144,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kashmiri (Devanagari)","description":"","tags":[],"dependencyGroup":null},{"value":1087,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kazakh","description":"","tags":[],"dependencyGroup":null},{"value":1107,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Khmer","description":"","tags":[],"dependencyGroup":null},{"value":1158,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"K'iche","description":"","tags":[],"dependencyGroup":null},{"value":1159,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kinyarwanda","description":"","tags":[],"dependencyGroup":null},{"value":1111,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Konkani","description":"","tags":[],"dependencyGroup":null},{"value":1042,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Korean","description":"","tags":[],"dependencyGroup":null},{"value":1088,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kyrgyz","description":"","tags":[],"dependencyGroup":null},{"value":1108,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Lao","description":"","tags":[],"dependencyGroup":null},{"value":1142,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Latin","description":"","tags":[],"dependencyGroup":null},{"value":1062,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Latvian","description":"","tags":[],"dependencyGroup":null},{"value":1063,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Lithuanian","description":"","tags":[],"dependencyGroup":null},{"value":1134,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Luxembourgish (Luxembourg)","description":"","tags":[],"dependencyGroup":null},{"value":1071,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Macedonian","description":"","tags":[],"dependencyGroup":null},{"value":2110,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Malay (Brunei)","description":"","tags":[],"dependencyGroup":null},{"value":1086,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Malay (Malaysia)","description":"","tags":[],"dependencyGroup":null},{"value":1100,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Malayalam","description":"","tags":[],"dependencyGroup":null},{"value":1082,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Maltese","description":"","tags":[],"dependencyGroup":null},{"value":1112,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Manipuri","description":"","tags":[],"dependencyGroup":null},{"value":1153,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Maori","description":"","tags":[],"dependencyGroup":null},{"value":1146,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Mapudungun","description":"","tags":[],"dependencyGroup":null},{"value":1102,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Marathi","description":"","tags":[],"dependencyGroup":null},{"value":1148,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Mohawk","description":"","tags":[],"dependencyGroup":null},{"value":1104,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Mongolian (Cyrillic)","description":"","tags":[],"dependencyGroup":null},{"value":2128,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Mongolian (Traditional Mongolian)","description":"","tags":[],"dependencyGroup":null},{"value":2145,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Nepali (India)","description":"","tags":[],"dependencyGroup":null},{"value":1121,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Nepali (Nepal)","description":"","tags":[],"dependencyGroup":null},{"value":1044,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Norwegian (Bokmål)","description":"","tags":[],"dependencyGroup":null},{"value":2068,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Norwegian (Nynorsk)","description":"","tags":[],"dependencyGroup":null},{"value":1154,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Occitan","description":"","tags":[],"dependencyGroup":null},{"value":1138,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Oromo","description":"","tags":[],"dependencyGroup":null},{"value":1096,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Odia","description":"","tags":[],"dependencyGroup":null},{"value":1145,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Papiamento","description":"","tags":[],"dependencyGroup":null},{"value":1123,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Pashto","description":"","tags":[],"dependencyGroup":null},{"value":1065,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Persian","description":"","tags":[],"dependencyGroup":null},{"value":1045,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Polish","description":"","tags":[],"dependencyGroup":null},{"value":1046,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Portuguese (Brazil)","description":"","tags":[],"dependencyGroup":null},{"value":2070,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Portuguese (Portugal)","description":"","tags":[],"dependencyGroup":null},{"value":1094,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Punjabi","description":"","tags":[],"dependencyGroup":null},{"value":2118,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Punjabi (Pakistan)","description":"","tags":[],"dependencyGroup":null},{"value":1131,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Quechua (Bolivia)","description":"","tags":[],"dependencyGroup":null},{"value":2155,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Quechua (Ecuador)","description":"","tags":[],"dependencyGroup":null},{"value":3179,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Quechua (Peru)","description":"","tags":[],"dependencyGroup":null},{"value":1047,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Romansh (Switzerland)","description":"","tags":[],"dependencyGroup":null},{"value":2072,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Romanian (Moldova)","description":"","tags":[],"dependencyGroup":null},{"value":1048,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Romanian (Romania)","description":"","tags":[],"dependencyGroup":null},{"value":2073,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Russian (Moldova)","description":"","tags":[],"dependencyGroup":null},{"value":1049,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Russian (Russia)","description":"","tags":[],"dependencyGroup":null},{"value":9275,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sami, Inari (Finland)","description":"","tags":[],"dependencyGroup":null},{"value":4155,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sami, Lule (Norway)","description":"","tags":[],"dependencyGroup":null},{"value":5179,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sami, Lule (Sweden)","description":"","tags":[],"dependencyGroup":null},{"value":3131,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sami, Northern (Finland)","description":"","tags":[],"dependencyGroup":null},{"value":1083,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sami, Northern (Norway)","description":"","tags":[],"dependencyGroup":null},{"value":2107,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sami, Northern (Sweden)","description":"","tags":[],"dependencyGroup":null},{"value":8251,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sami, Skolt (Finland)","description":"","tags":[],"dependencyGroup":null},{"value":6203,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sami, Southern (Norway)","description":"","tags":[],"dependencyGroup":null},{"value":7227,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sami, Southern (Sweden)","description":"","tags":[],"dependencyGroup":null},{"value":1103,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sanskrit","description":"","tags":[],"dependencyGroup":null},{"value":7194,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Serbian (Cyrillic, Bosnia and Herzegovina)","description":"","tags":[],"dependencyGroup":null},{"value":6170,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Serbian (Latin, Bosnia and Herzegovina)","description":"","tags":[],"dependencyGroup":null},{"value":3098,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Serbian (Cyrillic, Serbia and Montenegro (Former))","description":"","tags":[],"dependencyGroup":null},{"value":10266,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Serbian (Cyrillic, Serbia)","description":"","tags":[],"dependencyGroup":null},{"value":12314,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Serbian (Cyrillic, Montenegro)","description":"","tags":[],"dependencyGroup":null},{"value":2074,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Serbian (Latin, Serbia and Montenegro (Former))","description":"","tags":[],"dependencyGroup":null},{"value":11290,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Serbian (Latin, Montenegro)","description":"","tags":[],"dependencyGroup":null},{"value":9242,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Serbian (Latin, Serbia)","description":"","tags":[],"dependencyGroup":null},{"value":1072,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sesotho","description":"","tags":[],"dependencyGroup":null},{"value":1132,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sesotho sa Leboa","description":"","tags":[],"dependencyGroup":null},{"value":1074,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Setswana","description":"","tags":[],"dependencyGroup":null},{"value":1113,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sindhi (Devanagari)","description":"","tags":[],"dependencyGroup":null},{"value":2137,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sindhi (Arabic)","description":"","tags":[],"dependencyGroup":null},{"value":1115,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sinhala","description":"","tags":[],"dependencyGroup":null},{"value":1051,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Slovak","description":"","tags":[],"dependencyGroup":null},{"value":1060,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Slovenian","description":"","tags":[],"dependencyGroup":null},{"value":1143,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Somali","description":"","tags":[],"dependencyGroup":null},{"value":2094,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Lower Sorbian","description":"","tags":[],"dependencyGroup":null},{"value":1070,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Upper Sorbian","description":"","tags":[],"dependencyGroup":null},{"value":11274,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish (Argentina)","description":"","tags":[],"dependencyGroup":null},{"value":16394,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish (Bolivia)","description":"","tags":[],"dependencyGroup":null},{"value":13322,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish (Chile)","description":"","tags":[],"dependencyGroup":null},{"value":9226,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish (Colombia)","description":"","tags":[],"dependencyGroup":null},{"value":5130,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish (Costa Rica)","description":"","tags":[],"dependencyGroup":null},{"value":7178,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish (Dominican Republic)","description":"","tags":[],"dependencyGroup":null},{"value":12298,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish (Ecuador)","description":"","tags":[],"dependencyGroup":null},{"value":17418,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish (El Salvador)","description":"","tags":[],"dependencyGroup":null},{"value":4106,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish (Guatemala)","description":"","tags":[],"dependencyGroup":null},{"value":18442,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish (Honduras)","description":"","tags":[],"dependencyGroup":null},{"value":2058,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish (Mexico)","description":"","tags":[],"dependencyGroup":null},{"value":19466,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish (Nicaragua)","description":"","tags":[],"dependencyGroup":null},{"value":6154,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish (Panama)","description":"","tags":[],"dependencyGroup":null},{"value":15370,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish (Paraguay)","description":"","tags":[],"dependencyGroup":null},{"value":10250,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish (Peru)","description":"","tags":[],"dependencyGroup":null},{"value":20490,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish (Puerto Rico)","description":"","tags":[],"dependencyGroup":null},{"value":3082,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish (Spain)","description":"","tags":[],"dependencyGroup":null},{"value":21514,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish (United States)","description":"","tags":[],"dependencyGroup":null},{"value":14346,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish (Uruguay)","description":"","tags":[],"dependencyGroup":null},{"value":8202,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Spanish (Venezuela)","description":"","tags":[],"dependencyGroup":null},{"value":1089,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Swahili","description":"","tags":[],"dependencyGroup":null},{"value":2077,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Swedish (Finland)","description":"","tags":[],"dependencyGroup":null},{"value":1053,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Swedish (Sweden)","description":"","tags":[],"dependencyGroup":null},{"value":1114,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Syriac","description":"","tags":[],"dependencyGroup":null},{"value":2143,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Central Atlas Tamazight (Latin, Algeria)","description":"","tags":[],"dependencyGroup":null},{"value":1119,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Central Atlas Tamazight (Arabic, Morocco)","description":"","tags":[],"dependencyGroup":null},{"value":1097,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tamil","description":"","tags":[],"dependencyGroup":null},{"value":1092,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tatar","description":"","tags":[],"dependencyGroup":null},{"value":1098,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Telugu","description":"","tags":[],"dependencyGroup":null},{"value":1064,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tajik","description":"","tags":[],"dependencyGroup":null},{"value":1054,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Thai","description":"","tags":[],"dependencyGroup":null},{"value":1105,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tibetan (China)","description":"","tags":[],"dependencyGroup":null},{"value":2163,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tigrinya (Eritrea)","description":"","tags":[],"dependencyGroup":null},{"value":1139,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tigrinya (Ethiopia)","description":"","tags":[],"dependencyGroup":null},{"value":1055,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Turkish","description":"","tags":[],"dependencyGroup":null},{"value":1090,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Turkmen","description":"","tags":[],"dependencyGroup":null},{"value":1152,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Uyghur (China)","description":"","tags":[],"dependencyGroup":null},{"value":1058,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Ukrainian","description":"","tags":[],"dependencyGroup":null},{"value":1056,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Urdu","description":"","tags":[],"dependencyGroup":null},{"value":2115,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Uzbek (Cyrillic)","description":"","tags":[],"dependencyGroup":null},{"value":1091,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Uzbek (Latin)","description":"","tags":[],"dependencyGroup":null},{"value":2051,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Valencian","description":"","tags":[],"dependencyGroup":null},{"value":1075,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Venda","description":"","tags":[],"dependencyGroup":null},{"value":1066,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Vietnamese","description":"","tags":[],"dependencyGroup":null},{"value":1106,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Welsh","description":"","tags":[],"dependencyGroup":null},{"value":1160,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Wolof","description":"","tags":[],"dependencyGroup":null},{"value":1073,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Xitsonga","description":"","tags":[],"dependencyGroup":null},{"value":1157,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sakha","description":"","tags":[],"dependencyGroup":null},{"value":1144,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yi (China)","description":"","tags":[],"dependencyGroup":null},{"value":1085,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yiddish","description":"","tags":[],"dependencyGroup":null},{"value":1130,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yoruba","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1078,"description":"Defines the editing options for Office 2016 programs.  In addition to configuring this setting, consider enabling the same language in the 'Enabled Editing Languages' policy node.  Please refer to the Office Resource Kit documentation for important information on setting the installed version of Microsoft Office.","supportedPlatforms":["Windows"],"tags":["Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources","registrySubPath":"installlanguage","registryType":"REG_DWORD","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources","registrySubPath":"preferrededitinglanguage","enforcedValues":{"afrikaans":"af-ZA","albanian":"sq-AL","alsatian":"gsw-FR","amharic":"am-ET","arabic (Algeria)":"ar-DZ","arabic (Bahrain)":"ar-BH","arabic (Egypt)":"ar-EG","arabic (Iraq)":"ar-IQ","arabic (Jordan)":"ar-JO","arabic (Kuwait)":"ar-KW","arabic (Lebanon)":"ar-LB","arabic (Libya)":"ar-LY","arabic (Morocco)":"ar-MA","arabic (Oman)":"ar-OM","arabic (Qatar)":"ar-QA","arabic (Saudi Arabia)":"ar-SA","arabic (Syria)":"ar-SY","arabic (Tunisia)":"ar-TN","arabic (U.A.E.)":"ar-AE","arabic (Yemen)":"ar-YE","armenian (Armenia)":"hy-AM","assamese (India)":"as-IN","azerbaijani (Cyrillic)":"az-Cyrl-AZ","azerbaijani (Latin)":"az-Latn-AZ","bangla (Bangladesh)":"bn-BD","bangla (India)":"bn-IN","bashkir":"ba-RU","basque":"eu-ES","belarusian":"be-BY","bosnian (Cyrillic, Bosnia and Herzegovina)":"bs-Cyrl-BA","bosnian (Latin, Bosnia and Herzegovina)":"bs-Latn-BA","breton":"br-FR","bulgarian":"bg-BG","burmese":"my-MM","catalan":"ca-ES","central Kurdish (Iraq)":"ku-Arab-IQ","cherokee":"chr-Cher-US","chinese (China)":"zh-CN","chinese (Hong Kong S.A.R.)":"zh-HK","chinese (Macao S.A.R.)":"zh-MO","chinese (Singapore)":"zh-SG","chinese (Taiwan)":"zh-TW","corsican":"co-FR","croatian (Bosnia and Herzegovina)":"hr-BA","croatian (Croatia)":"hr-HR","czech":"cs-CZ","danish":"da-DK","dari":"prs-AF","divehi":"dv-MV","dutch (Belgium)":"nl-BE","dutch (Netherlands)":"nl-NL","edo":"bin-NG","english (Australia)":"en-AU","english (Belize)":"en-BZ","english (Canada)":"en-CA","english (Caribbean)":"en-029","english (Hong Kong S.A.R.)":"en-HK","english (India)":"en-IN","english (Indonesia)":"en-ID","english (Ireland)":"en-IE","english (Jamaica)":"en-JM","english (Malaysia)":"en-MY","english (New Zealand)":"en-NZ","english (Philippines)":"en-PH","english (Singapore)":"en-SG","english (South Africa)":"en-ZA","english (Trinidad and Tobago)":"en-TT","english (U.K.)":"en-GB","english (U.S.)":"en-US","english (Zimbabwe)":"en-ZW","estonian":"et-EE","faeroese":"fo-FO","filipino":"fil-PH","finnish":"fi-FI","french (Belgium)":"fr-BE","french (Cameroon)":"fr-CM","french (Canada)":"fr-CA","french (Caribbean)":"fr-029","french (Congo (DRC))":"fr-CD","french (Côte d'Ivoire)":"fr-CI","french (France)":"fr-FR","french (Haiti)":"fr-HT","french (Luxembourg)":"fr-LU","french (Mali)":"fr-ML","french (Monaco)":"fr-MC","french (Morocco)":"fr-MA","french (Reunion)":"fr-RE","french (Senegal)":"fr-SN","french (Switzerland)":"fr-CH","western Frisian (Netherlands)":"fy-NL","fulfulde":"ff-NG","scottish Gaelic (United Kingdom)":"gd-GB","galician":"gl-ES","georgian":"ka-GE","german (Austria)":"de-AT","german (Germany)":"de-DE","german (Liechtenstein)":"de-LI","german (Luxembourg)":"de-LU","german (Switzerland)":"de-CH","greek":"el-GR","greenlandic":"kl-GL","guarani":"gn-PY","gujarati":"gu-IN","hausa (Latin)":"ha-Latn-NG","hawaiian":"haw-US","hebrew (Israel)":"he-IL","hindi":"hi-IN","hungarian":"hu-HU","ibibio":"ibb-NG","icelandic":"is-IS","igbo":"ig-NG","indonesian":"id-ID","inuktitut (Latin)":"iu-Latn-CA","inuktitut (Syllabics)":"iu-Cans-CA","irish (Ireland)":"ga-IE","isiZulu":"zu-ZA","isiXhosa":"xh-ZA","italian (Italy)":"it-IT","italian (Switzerland)":"it-CH","japanese":"ja-JP","kannada":"kn-IN","kanuri":"kr-NG","kashmiri (Arabic)":"ks-Arab-IN","kashmiri (Devanagari)":"ks-Deva-IN","kazakh":"kk-KZ","khmer":"km-KH","k'iche":"quc-Latn-GT","kinyarwanda":"rw-RW","konkani":"kok-IN","korean":"ko-KR","kyrgyz":"ky-KG","lao":"lo-LA","latin":"la-Latn","latvian":"lv-LV","lithuanian":"lt-LT","luxembourgish (Luxembourg)":"lb-LU","macedonian":"mk-MK","malay (Brunei)":"ms-BN","malay (Malaysia)":"ms-MY","malayalam":"ml-IN","maltese":"mt-MT","manipuri":"mni-IN","maori":"mi-NZ","mapudungun":"arn-CL","marathi":"mr-IN","mohawk":"moh-CA","mongolian (Cyrillic)":"mn-MN","mongolian (Traditional Mongolian)":"mn-Mong-CN","nepali (India)":"ne-IN","nepali (Nepal)":"ne-NP","norwegian (Bokmål)":"nb-NO","norwegian (Nynorsk)":"nn-NO","occitan":"oc-FR","oromo":"om-ET","odia":"or-IN","papiamento":"pap-029","pashto":"ps-AF","persian":"fa-IR","polish":"pl-PL","portuguese (Brazil)":"pt-BR","portuguese (Portugal)":"pt-PT","punjabi":"pa-IN","punjabi (Pakistan)":"pa-Arab-PK","quechua (Bolivia)":"quz-BO","quechua (Ecuador)":"quz-EC","quechua (Peru)":"quz-PE","romansh (Switzerland)":"rm-CH","romanian (Moldova)":"ro-MD","romanian (Romania)":"ro-RO","russian (Moldova)":"ru-MD","russian (Russia)":"ru-RU","sami, Inari (Finland)":"smn-FI","sami, Lule (Norway)":"smj-NO","sami, Lule (Sweden)":"smj-SE","sami, Northern (Finland)":"se-FI","sami, Northern (Norway)":"se-NO","sami, Northern (Sweden)":"se-SE","sami, Skolt (Finland)":"sms-FI","sami, Southern (Norway)":"sma-NO","sami, Southern (Sweden)":"sma-SE","sanskrit":"sa-IN","serbian (Cyrillic, Bosnia and Herzegovina)":"sr-Cyrl-BA","serbian (Latin, Bosnia and Herzegovina)":"sr-Latn-BA","serbian (Cyrillic, Serbia and Montenegro (Former))":"sr-Cyrl-CS","serbian (Cyrillic, Serbia)":"sr-Cyrl-RS","serbian (Cyrillic, Montenegro)":"sr-Cyrl-ME","serbian (Latin, Serbia and Montenegro (Former))":"sr-Latn-CS","serbian (Latin, Montenegro)":"sr-Latn-ME","serbian (Latin, Serbia)":"sr-Latn-RS","sesotho":"st-ZA","sesotho sa Leboa":"nso-ZA","setswana":"tn-ZA","sindhi (Devanagari)":"sd-Deva-IN","sindhi (Arabic)":"sd-Arab-PK","sinhala":"si-LK","slovak":"sk-SK","slovenian":"sl-SI","somali":"so-SO","lower Sorbian":"dsb-DE","upper Sorbian":"hsb-DE","spanish (Argentina)":"es-AR","spanish (Bolivia)":"es-BO","spanish (Chile)":"es-CL","spanish (Colombia)":"es-CO","spanish (Costa Rica)":"es-CR","spanish (Dominican Republic)":"es-DO","spanish (Ecuador)":"es-EC","spanish (El Salvador)":"es-SV","spanish (Guatemala)":"es-GT","spanish (Honduras)":"es-HN","spanish (Mexico)":"es-MX","spanish (Nicaragua)":"es-NI","spanish (Panama)":"es-PA","spanish (Paraguay)":"es-PY","spanish (Peru)":"es-PE","spanish (Puerto Rico)":"es-PR","spanish (Spain)":"es-ES","spanish (United States)":"es-US","spanish (Uruguay)":"es-UY","spanish (Venezuela)":"es-VE","swahili":"sw-KE","swedish (Finland)":"sv-FI","swedish (Sweden)":"sv-SE","syriac":"syr-SY","central Atlas Tamazight (Latin, Algeria)":"tzm-Latn-DZ","central Atlas Tamazight (Arabic, Morocco)":"tzm-Arab-MA","tamil":"ta-IN","tatar":"tt-RU","telugu":"te-IN","tajik":"tg-Cyrl-TJ","thai":"th-TH","tibetan (China)":"bo-CN","tigrinya (Eritrea)":"ti-ER","tigrinya (Ethiopia)":"ti-ET","turkish":"tr-TR","turkmen":"tk-TM","uyghur (China)":"ug-CN","ukrainian":"uk-UA","urdu":"ur-PK","uzbek (Cyrillic)":"uz-Cyrl-UZ","uzbek (Latin)":"uz-Latn-UZ","valencian":"ca-ES-valencia","venda":"ve-ZA","vietnamese":"vi-VN","welsh":"cy-GB","wolof":"wo-SN","xitsonga":"ts-ZA","sakha":"sah-RU","yi (China)":"ii-CN","yiddish":"yi-Hebr","yoruba":"yo-NG"}}]}}},{"id":"office16;L_PrintTicketSafeMode","uniqueId":1540,"displayName":"Print ticket safe mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to determine whether Word, PowerPoint, or Excel turns off print ticket features the next time it attempts to use print ticket features after the application fails.  Print ticket features include duplexing and stapling.\n\nIf you enable or do not configure this policy setting, print ticket features are turned off if Word, PowerPoint, and Excel fail while attempting to use a printer's print ticket functionality.  When the printer is next used, its print ticket features are turned off until the user requests to use them again.\n\nIf you disable this policy setting, Word, PowerPoint, or Excel does not turn off print ticket features due to a previous application failure. This might result in repeated instances of the printer not responding.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"disableprintfeaturesoncrash","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Processcompoundnouns","uniqueId":1689,"displayName":"Process compound nouns","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option. This option is available only if you are using the Korean language version of Microsoft Office or have installed Microsoft Office 2016 proofing tools or the Microsoft Office Single Language Pack 2016 for Korean, and have enabled support for Korean through Microsoft Office 2016 Language Preferences.","supportedPlatforms":["Windows"],"tags":["Tools | Options | Spelling","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpref","registrySubPath":"fsplcompoundnoun_1524_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Promptforsendingrevieweddocumenttoauthor;L_empty395","uniqueId":2452,"displayName":"Prompt for sending reviewed document to author","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Never ask user","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt for 'send for review'","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Always prompt","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":2,"description":"\"Never ask user\": Do not ask users if they want to send back changes to the author. | \"Prompt for 'send for review\"': Ask users if they want to send back changes to the author only if the document was sent using Send For Review and not with ad-hoc review. | \"Always prompt\": Ask users if they want to send back changes to the author for documents sent using either Send For Review or ad-hoc review.","supportedPlatforms":["Windows"],"tags":["Collaboration Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"prompttoreturnreviewbehavior","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Promptforsendingrevieweddocumenttoauthor","uniqueId":2453,"displayName":"Prompt for sending reviewed document to author","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Promptforsendingrevieweddocumenttoauthor;L_empty395","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\"Never ask user\": Do not ask users if they want to send back changes to the author. | \"Prompt for 'send for review\"': Ask users if they want to send back changes to the author only if the document was sent using Send For Review and not with ad-hoc review. | \"Always prompt\": Ask users if they want to send back changes to the author for documents sent using either Send For Review or ad-hoc review.","supportedPlatforms":["Windows"],"tags":["Collaboration Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Protectdocumentmetadataforpasswordprotected","uniqueId":1999,"displayName":"Protect document metadata for password protected files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether metadata is encrypted when an Office Open XML file is password protected.\n       \n If you enable this policy setting, Excel 2016, PowerPoint 2016, and Word 2016 encrypt metadata stored in password-protected Office Open XML files and override any configuration changes on users' computers.\n \n If you disable this policy setting, Office 2016 applications cannot encrypt metadata in password-protected Office Open XML files, which can reduce security.\n \n If you do not configure this policy setting, when an Office Open XML document is protected with a password and saved, any metadata associated with the document is encrypted along with the rest of the document's contents. If this configuration is changed, potentially sensitive information such as the document author and hyperlink references could be exposed to unauthorized people.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security","registrySubPath":"openxmlencryptproperty","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Protectdocumentmetadataforrightsmanaged","uniqueId":1998,"displayName":"Protect document metadata for rights managed Office Open XML Files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting determines whether metadata is encrypted in Office Open XML files that are protected by Information Rights Management (IRM). \n\nIf you enable this policy setting, Excel, PowerPoint, and Word encrypt metadata stored in rights-managed Office Open XML files and override any configuration changes on users' computers. \n\nIf you disable this policy setting, Office 2016 applications cannot encrypt metadata in rights-managed Office Open XML files, which can reduce security. \n\nIf you do not configure this policy setting, when Information Rights Management (IRM) is used to restrict access to an Office Open XML document, any metadata associated with the document is not encrypted.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security","registrySubPath":"drmencryptproperty","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Providefeedbackwithsound","uniqueId":2710,"displayName":"Provide feedback with sound","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"sound","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Punjabi","uniqueId":2205,"displayName":"Punjabi","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Punjabi","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"pa-in","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_PunjabiPakistan","uniqueId":2206,"displayName":"Punjabi (Pakistan)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Punjabi (Pakistan)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"pa-arab-pk","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_QuechuaBolivia","uniqueId":2207,"displayName":"Quechua (Bolivia)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Quechua (Bolivia)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"quz-bo","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_QuechuaEcuador","uniqueId":2208,"displayName":"Quechua (Ecuador)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Quechua (Ecuador)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"quz-ec","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_QuechuaPeru","uniqueId":2209,"displayName":"Quechua (Peru)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Quechua (Peru)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"quz-pe","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_QueryInstancesLimit","uniqueId":2575,"displayName":"Set query items limit","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_QueryInstancesLimit;L_QueryInstancesLimitDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the maximum number of items that will be added to the client’s cache as the result of executing a query.  Several bulk operations (especially queries) can return a large number of items to be added to the cache. This increases the size of the cache, potentially exceeding the 4GB limit imposed by Microsoft SQL Server CE. It also increases the amount of work required to keep the cache synchronized and increases the load on the LOB server. In order to protect the system, a limit is used – any results processed before reaching the limit are still committed, but the operation is marked as failed and will be retried later.\n\nIf you enable this policy setting, you may specify the maximum number of items that will be added to the client’s cache as the result of executing a query.\n\nIf you disable or do not configure this policy setting, a default value of 2000 items will be used.","supportedPlatforms":["Windows"],"tags":["Synchronization","Business Data","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_QueryInstancesLimit;L_QueryInstancesLimitDecimal","uniqueId":2574,"displayName":"Query instances limit","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":32767},"dataType":"Integer"},"description":"This policy setting allows you to specify the maximum number of items that will be added to the client’s cache as the result of executing a query.  Several bulk operations (especially queries) can return a large number of items to be added to the cache. This increases the size of the cache, potentially exceeding the 4GB limit imposed by Microsoft SQL Server CE. It also increases the amount of work required to keep the cache synchronized and increases the load on the LOB server. In order to protect the system, a limit is used – any results processed before reaching the limit are still committed, but the operation is marked as failed and will be retried later.\n\nIf you enable this policy setting, you may specify the maximum number of items that will be added to the client’s cache as the result of executing a query.\n\nIf you disable or do not configure this policy setting, a default value of 2000 items will be used.","supportedPlatforms":["Windows"],"tags":["Synchronization","Business Data","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\business data\\synchronization","registrySubPath":"query instances limit","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_QueryTimeout","uniqueId":2573,"displayName":"Set query processing timeout limit","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_QueryTimeout;L_QueryTimeoutDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the maximum number of minutes the system will spend processing an individual query.  When the interval is exceeded, the processing is aborted and the query is marked as failed.  The query will then be retried later.  Several bulk operations (especially queries) can take a significant amount of time before all results are retrieved and processed.  During this time no other operation can be processed.\n\nIf you enable this policy setting, you may specify the maximum number of minutes the system will spend processing an individual query.\n\nIf you disable or do not configure this policy setting, a default value of 20 minutes will be used.","supportedPlatforms":["Windows"],"tags":["Synchronization","Business Data","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_QueryTimeout;L_QueryTimeoutDecimal","uniqueId":2572,"displayName":"Time before query timeout (minutes)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":360},"dataType":"Integer"},"description":"This policy setting allows you to specify the maximum number of minutes the system will spend processing an individual query.  When the interval is exceeded, the processing is aborted and the query is marked as failed.  The query will then be retried later.  Several bulk operations (especially queries) can take a significant amount of time before all results are retrieved and processed.  During this time no other operation can be processed.\n\nIf you enable this policy setting, you may specify the maximum number of minutes the system will spend processing an individual query.\n\nIf you disable or do not configure this policy setting, a default value of 20 minutes will be used.","supportedPlatforms":["Windows"],"tags":["Synchronization","Business Data","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\business data\\synchronization","registrySubPath":"query timeout","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_RAICustomizability","uniqueId":5376,"displayName":"Adjust responsible AI protections for Microsoft 365 Copilot","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_RAICustomizability;L_HarmfulContentProtections","logicalOperator":"exists","values":[]}],"logicalOperator":1}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to control whether users can adjust harmful content protection options.\n\nImportant: By enabling this option, your organization will open up Microsoft 365 Copilot Chat’s broad capabilities for use in specialized roles and industries where exposure to content harms is necessary (e.g. content moderation, legal review, law enforcement, etc).\n\nThis setting allows responses to your users to include sexual content, violence, hate, and self-harm. Disabling Harmful Content Protection may result in system responses that contain content that violates the Microsoft Generative AI Services Code of Conduct (https://learn.microsoft.com/en-us/legal/ai-code-of-conduct).\n\nNote: This policy only applies to Microsoft 365 Copilot Chat.\n\nIf you enable this policy, you have the option to provide your users with the option to adjust harmful content protections.\n\nIf you choose 'Provide users with the option to adjust harmful content protection', your users will have the option to adjust harmful content protection by using the 'Harmful content protection' toggle in the Copilot user interface. By default, for any new conversation with Copilot, the toggle is set to On which means that harmful content protection is still in effect.\n\nIf the user moves the toggle to Off, it has the following effect on harmful content protection:\n-Protection is turned off for harmful content moderation for content that includes the following: violence, sexual, hate, fairness, or self-harm.\n-Protection is turned off for grounded content generation (for example, summarization) for both text and multimodal (such as images, video, or audio).\n\nEven if the user moves the toggle to Off, harmful content protection isn’t turned off for ungrounded content generation, such as text compose, image generation, or video generation. If the user moves the toggle to Off during a conversation with Copilot, they can’t later move the toggle back to On during the same conversation. To turn harmful content protection back on, they need to start a new conversation with Copilot.\n\nIf you choose 'Don’t provide users with the option to adjust harmful content protection', no adjustments are made to harmful content protection. All harmful content protection is in effect. Also, your users won’t see the 'Harmful content protection' toggle in the Copilot user interface.\n\nIf you don’t configure this policy, no adjustments are made to harmful content protection. All harmful content protection and all other responsible AI protections are in effect. Also, your users won’t see the 'Harmful content protection' toggle in the Copilot user interface.\n\nImportant: The following responsible AI protections are always in effect and can’t be adjusted, even if you choose to adjust harmful content protection:\n-AI safety protections, such as user prompt injection attack (UPIA) and cross-prompt injected attack (XPIA).\n-Protected materials protections, such as preventing generation of content that is copyrighted.\n\n","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["RAICustomizability","Cloud Policies Boolean","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_RAICustomizability;L_HarmfulContentProtections","uniqueId":5377,"displayName":"Options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Provide users with the option to adjust harmful content protection","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Don’t provide users with the option to adjust harmful content protection","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to control whether users can adjust harmful content protection options.\n\nImportant: By enabling this option, your organization will open up Microsoft 365 Copilot Chat’s broad capabilities for use in specialized roles and industries where exposure to content harms is necessary (e.g. content moderation, legal review, law enforcement, etc).\n\nThis setting allows responses to your users to include sexual content, violence, hate, and self-harm. Disabling Harmful Content Protection may result in system responses that contain content that violates the Microsoft Generative AI Services Code of Conduct (https://learn.microsoft.com/en-us/legal/ai-code-of-conduct).\n\nNote: This policy only applies to Microsoft 365 Copilot Chat.\n\nIf you enable this policy, you have the option to provide your users with the option to adjust harmful content protections.\n\nIf you choose 'Provide users with the option to adjust harmful content protection', your users will have the option to adjust harmful content protection by using the 'Harmful content protection' toggle in the Copilot user interface. By default, for any new conversation with Copilot, the toggle is set to On which means that harmful content protection is still in effect.\n\nIf the user moves the toggle to Off, it has the following effect on harmful content protection:\n-Protection is turned off for harmful content moderation for content that includes the following: violence, sexual, hate, fairness, or self-harm.\n-Protection is turned off for grounded content generation (for example, summarization) for both text and multimodal (such as images, video, or audio).\n\nEven if the user moves the toggle to Off, harmful content protection isn’t turned off for ungrounded content generation, such as text compose, image generation, or video generation. If the user moves the toggle to Off during a conversation with Copilot, they can’t later move the toggle back to On during the same conversation. To turn harmful content protection back on, they need to start a new conversation with Copilot.\n\nIf you choose 'Don’t provide users with the option to adjust harmful content protection', no adjustments are made to harmful content protection. All harmful content protection is in effect. Also, your users won’t see the 'Harmful content protection' toggle in the Copilot user interface.\n\nIf you don’t configure this policy, no adjustments are made to harmful content protection. All harmful content protection and all other responsible AI protections are in effect. Also, your users won’t see the 'Harmful content protection' toggle in the Copilot user interface.\n\nImportant: The following responsible AI protections are always in effect and can’t be adjusted, even if you choose to adjust harmful content protection:\n-AI safety protections, such as user prompt injection attack (UPIA) and cross-prompt injected attack (XPIA).\n-Protected materials protections, such as preventing generation of content that is copyrighted.\n\n","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["RAICustomizability","HarmfulContentProtections","Cloud Policies Enum","Cloud Policies Composite","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\copilot","registrySubPath":"HarmfulContentProtections","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_RefreshFrequencyLimit","uniqueId":2565,"displayName":"Set refresh frequency limit","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_RefreshFrequencyLimit;L_RefreshFrequencyLimitDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to enforce a lower limit in minutes for the refresh interval.  Refreshing subscriptions too frequently can overload the LOB systems or the network with too many requests.\n\nIf you enable this policy setting, you may specify the number of minutes for the refresh interval.  This limit prevents cache subscriptions from being refreshed more frequently, reducing the number of requests issued against the line-of-business (LOB) system.\n\nIf you disable or do not configure this policy setting, a default limit of 10 minutes will be used.","supportedPlatforms":["Windows"],"tags":["Synchronization","Business Data","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_RefreshFrequencyLimit;L_RefreshFrequencyLimitDecimal","uniqueId":2564,"displayName":"Refresh frequency limit (minutes)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":1000000},"dataType":"Integer"},"description":"This policy setting allows you to enforce a lower limit in minutes for the refresh interval.  Refreshing subscriptions too frequently can overload the LOB systems or the network with too many requests.\n\nIf you enable this policy setting, you may specify the number of minutes for the refresh interval.  This limit prevents cache subscriptions from being refreshed more frequently, reducing the number of requests issued against the line-of-business (LOB) system.\n\nIf you disable or do not configure this policy setting, a default limit of 10 minutes will be used.","supportedPlatforms":["Windows"],"tags":["Synchronization","Business Data","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\business data\\synchronization","registrySubPath":"refresh frequency limit","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_RelyonCSSforfontformatting;L_ChecktoenforceCSSonunchecktoenforceCSSoff","uniqueId":1655,"displayName":"Enforce CSS","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This policy setting allows you to rely on CSS for font formatting.\n\nIf you enable this policy setting, you may select configure these options:\n- Enforce CSS: If checked, enforce CSS is on.  If not checked, enforce CSS is off.\n- CSS setting for Word: If checked, the CSS setting for Word as an email editor is used.\n\nIf you disable or do not configure this policy setting, the options will not be configured.","supportedPlatforms":["Windows"],"tags":["General","Tools | Options | General | Web Options...","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"donotrelyoncss","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_RelyonCSSforfontformatting","uniqueId":1657,"displayName":"Rely on CSS for font formatting","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_RelyonCSSforfontformatting;L_ChecktoenforceCSSonunchecktoenforceCSSoff","logicalOperator":"exists","values":null},{"dependee":"office16;L_RelyonCSSforfontformatting;L_UsetheCSSsettingforWordasanEmaileditor","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to rely on CSS for font formatting.\n\nIf you enable this policy setting, you may select configure these options:\n- Enforce CSS: If checked, enforce CSS is on.  If not checked, enforce CSS is off.\n- CSS setting for Word: If checked, the CSS setting for Word as an email editor is used.\n\nIf you disable or do not configure this policy setting, the options will not be configured.","supportedPlatforms":["Windows"],"tags":["General","Tools | Options | General | Web Options...","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_RelyonCSSforfontformatting;L_UsetheCSSsettingforWordasanEmaileditor","uniqueId":1656,"displayName":"CSS setting for Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to rely on CSS for font formatting.\n\nIf you enable this policy setting, you may select configure these options:\n- Enforce CSS: If checked, enforce CSS is on.  If not checked, enforce CSS is off.\n- CSS setting for Word: If checked, the CSS setting for Word as an email editor is used.\n\nIf you disable or do not configure this policy setting, the options will not be configured.","supportedPlatforms":["Windows"],"tags":["General","Tools | Options | General | Web Options...","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"userelyoncssformail","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_RelyonVMLfordisplayinggraphicsinbrowsers","uniqueId":1664,"displayName":"Rely on VML for displaying graphics in browsers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Office 2016 applications save standard raster file format (GIF or PNG) copies of Vector Markup Language (VML) graphics when documents are saved as Web pages.\n\nIf you enable this policy setting, Office 2016 applications will not generate alternate files for VML graphics when documents are saved as Web pages. In addition, the \"Rely on VML for displaying graphics in browsers\" check box is checked in the Web Options dialog in Excel, PowerPoint, and Word, and users cannot change it.\n\nIf you disable this policy setting, Office 2016 applications also save copies of the graphics in a standard raster file format (GIF or PNG) for use by browsers that cannot display VML. In addition, the \"Rely on VML for displaying graphics in browsers\" check box is cleared in the Web Options dialog in Excel, PowerPoint, and Word, and users cannot change it.\n\nIf you do not configure this policy setting, when saving VML graphics, Office 2016 applications also save copies of the graphics in a standard raster file format (GIF or PNG) for use by browsers that cannot display VML. If the \"Rely on VML for displaying graphics in browsers\" check box in the Web Options dialog is selected, applications will not save raster copies of VML graphics, which means those graphics will not display in non-Microsoft browsers.","supportedPlatforms":["Windows"],"tags":["Browsers","Tools | Options | General | Web Options...","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"relyonvml","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_RemoveMemberOfTab","uniqueId":2315,"displayName":"Remove Member Of tab","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to remove the Member Of tab from the Contact Card.\n\nIf you enable this policy setting the Member Of tab is removed from the Contact Card.\n\nIf you disable or do not configure this policy setting the Member Of tab appears on the Contact Card.","supportedPlatforms":["Windows"],"tags":["Contact Card","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoffmemberoftab","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_RemoveOrganizationTab","uniqueId":2314,"displayName":"Remove Organization tab","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to remove the Organization tab from the Contact Card.\n\nIf you enable this policy setting, the Organization tab is removed from the Contact Card.\n\nIf you disable or do not configure this policy setting, the Organization tab appears on the Contact Card.","supportedPlatforms":["Windows"],"tags":["Contact Card","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnofforganizationtab","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Replacetextasyoutype","uniqueId":1654,"displayName":"Replace text as you type","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Tools | AutoCorrect Options... (Excel, PowerPoint and Access)","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\autocorrect","registrySubPath":"replacetext","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_RequestedXAdESLevelForSignatureGeneration","uniqueId":1744,"displayName":"Requested XAdES level for signature generation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_RequestedXAdESLevelForSignatureGeneration;L_RequestedXAdESLevelForSignatureGenerationDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a requested or desired XAdES level in creating a digital signature. \n\nIf you enable this policy setting, you may specify the XAdES level in creating a digital signature.  If the desired XAdES level is not reached, the last highest XAdES level reached is used if the level is higher than the minimum XAdES level (XAdeES-BES).\n\n- No XAdES: XML-DSig - No XAdES\n- XAdES-BES: Minimal XAdES (Default)\n- XAdES-T: Will fall back to XAdES-BES if minimum XAdES level < XAdes-T\n- XAdES-C: Will fall back to XAdES-T if minimum XAdES level < XAdes-C\n- XAdES-X: Will fall back to XAdES-C if minimum XAdES level < XAdes-X\n- XAdES-X-L: Will fall back to XAdES-X if minimum XAdES level < XAdes-X-L\n\nIf you disable or do not configure this policy setting, XAdES-BES will be used.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_RequestedXAdESLevelForSignatureGeneration;L_RequestedXAdESLevelForSignatureGenerationDropID","uniqueId":1743,"displayName":"Requested XAdES level for signature generation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No XAdES","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"XAdES-BES","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"XAdES-T","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"XAdES-C","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"XAdES-X","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"XAdES-X-L","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This policy setting allows you to specify a requested or desired XAdES level in creating a digital signature. \n\nIf you enable this policy setting, you may specify the XAdES level in creating a digital signature.  If the desired XAdES level is not reached, the last highest XAdES level reached is used if the level is higher than the minimum XAdES level (XAdeES-BES).\n\n- No XAdES: XML-DSig - No XAdES\n- XAdES-BES: Minimal XAdES (Default)\n- XAdES-T: Will fall back to XAdES-BES if minimum XAdES level < XAdes-T\n- XAdES-C: Will fall back to XAdES-T if minimum XAdES level < XAdes-C\n- XAdES-X: Will fall back to XAdES-C if minimum XAdES level < XAdes-X\n- XAdES-X-L: Will fall back to XAdES-X if minimum XAdES level < XAdes-X-L\n\nIf you disable or do not configure this policy setting, XAdES-BES will be used.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"xadeslevel","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_RequireAlwaysOnMacroSig","uniqueId":2930,"displayName":"Require trusted publisher signatures for macros that are always loaded","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls signature requirements for macros that are automatically loaded when Office applications start.\n\nMacros that are always loaded include VBA add-ins and templates that load automatically: Excel add-ins (xla/xlam), PowerPoint add-ins (ppa/ppam), Access add-ins (accda/mda), and Word templates (dot/dotm).\n\nIf you enable this policy setting:\n- Unsigned macros that are always loaded are silently disabled and don't load.\n- Signed but untrusted macros that are always loaded display a red Message Bar with no option for users to enable them for the current session.\n- Macros signed by a trusted publisher are allowed to always load.\n\nIf you disable or don't configure this policy setting, macros that are always on can load without requiring trusted publisher signatures.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security","registrySubPath":"requirealwaysonmacrosig","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_RequireOCSPAtSignatureGenerationTime","uniqueId":1709,"displayName":"Require OCSP at signature generation time","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting lets you determine whether Office 2016 requires OCSP (Online Certificate Status Protocol) revocation data for all digital certificates in a chain when digital signatures are generated.\n\nIf you enable this policy setting, Office 2016 requires OCSP revocation data for all certificates in a chain when digital signatures are generated.\n\nIf you disable or do not configure this policy setting, Office 2016 does not set any restrictions on what type of revocation data is to be used.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"requireocsp","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_RestrictBrandKitCreation","uniqueId":5412,"displayName":"Restrict brand kit creation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_RestrictBrandKitCreation;L_RestrictBrandKitCreationGroup","logicalOperator":"exists","values":[]}],"logicalOperator":1}}]},"dataType":"Composite"},"description":"This policy setting allows administrators to define the permitted users for creating personal brand kits.\n\nIf you enable this policy setting and define the group of permitted users to create brand kits, only those users will be able to create personal brand kits.\n\nIf you do not configure this policy, all Copilot premium licensed users in the tenant will have the ability to create personal brand kits.\n\nNote: This policy only applies to brand kit creation. Access to brand kits for creating branded artifacts is not impacted by this policy. This policy is only applicable to brand kits available via Copilot Create used for branded artifact creation on Create and PowerPoint.\n\nFor more information refer to https://learn.microsoft.com/en-us/microsoft-365/copilot/enterprise-brand-manager.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["RestrictBrandKitCreation","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_RestrictBrandKitCreation;L_RestrictBrandKitCreationGroup","uniqueId":5413,"displayName":"Security group email address:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows administrators to define the permitted users for creating personal brand kits.\n\nIf you enable this policy setting and define the group of permitted users to create brand kits, only those users will be able to create personal brand kits.\n\nIf you do not configure this policy, all Copilot premium licensed users in the tenant will have the ability to create personal brand kits.\n\nFor more information refer to https://learn.microsoft.com/en-us/microsoft-365/copilot/enterprise-brand-manager. \n\nNote: This policy only applies to brand kit creation. Access to brand kits for creating branded artifacts is not impacted by this policy. This policy is only applicable to brand kits available via Copilot Create used for branded artifact creation on Create and PowerPoint.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["RestrictBrandKitCreation","Cloud Policies Text","Cloud Policies Composite","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\brandmanagers","registrySubPath":"restrictbrandkitcreation","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_RestrictCUCOMAddin","uniqueId":2934,"displayName":"Block loading of COM/VSTO add-ins registered in HKCU","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether COM/VSTO add-ins registered only in HKEY_CURRENT_USER (HKCU) are blocked from loading.\n\nStandard users can install add-ins through ClickOnce deployment or the Office Add-ins settings, which typically register add-ins in HKCU rather than HKEY_LOCAL_MACHINE (HKLM).\n\nIf you enable this policy setting, all COM/VSTO add-ins registered only in HKCU will be blocked from loading, preventing users from running add-ins they have installed without administrator privileges.\n\nIf you disable or don't configure this policy setting, COM/VSTO add-ins registered in HKCU are allowed to load normally.\n\nNote: Add-ins registered in HKLM (typically installed by administrators) are not affected by this policy setting.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security","registrySubPath":"restrictcucomaddin","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_RestrictedModeTelemetry","uniqueId":5378,"displayName":"Restricted Mode Telemetry","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether Office clients will send telemetry events associated with Restricted Mode to Microsoft.\n\nIf you enable this policy setting, Restricted Mode telemetry will be sent Microsoft.\n\nIf you disable or don't configure this policy setting, Restricted Mode telemetry will not be sent to Microsoft.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["RestrictedModeTelemetry","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\clienttelemetry","registrySubPath":"RestrictedModeTelemetry","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_RestrictKFMFromOffice","uniqueId":3060,"displayName":"Restrict KFM from Office","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether eligible Word, Excel, and PowerPoint users are presented with a Message Bar to opt-in in Known Folder Move (KFM).\n\nIf you enable this policy setting, users won’t be presented with the Message Bar in Office Apps.\n\nIf you disable or don’t configure this policy setting, eligible users will be presented with the Message Bar in Office Apps.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for Enterprise.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\kfm","registrySubPath":"disablekfmbusbarforcommercialusers","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_RetryIntervalLimit","uniqueId":2571,"displayName":"Set subscription refresh retry interval","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_RetryIntervalLimit;L_RetryIntervalLimitDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the maximum number of minutes the system must wait before retrying the operation execution of a failed operation.\n\nIf you enable this policy setting, you may specify the maximum interval in minutes before a retrying the operation execution of a failed operation.\n\nIf you disable or do not configure this policy setting, then a default value of 360 minutes will be used.\n","supportedPlatforms":["Windows"],"tags":["Synchronization","Business Data","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_RetryIntervalLimit;L_RetryIntervalLimitDecimal","uniqueId":2570,"displayName":"Maximum retry interval (minutes)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":1440},"dataType":"Integer"},"description":"This policy setting allows you to specify the maximum number of minutes the system must wait before retrying the operation execution of a failed operation.\n\nIf you enable this policy setting, you may specify the maximum interval in minutes before a retrying the operation execution of a failed operation.\n\nIf you disable or do not configure this policy setting, then a default value of 360 minutes will be used.\n","supportedPlatforms":["Windows"],"tags":["Synchronization","Business Data","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\business data\\synchronization","registrySubPath":"retry interval limit","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_RomanianMoldova","uniqueId":2211,"displayName":"Romanian (Moldova)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Romanian (Moldova)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ro-md","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_RomanianRomania","uniqueId":2212,"displayName":"Romanian (Romania)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Romanian (Romania)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ro-ro","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_RomanshSwitzerland","uniqueId":2210,"displayName":"Romansh (Switzerland)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Romansh (Switzerland)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"rm-ch","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_RussianMoldova","uniqueId":2213,"displayName":"Russian (Moldova)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Russian (Moldova)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ru-md","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_RussianRussia","uniqueId":2214,"displayName":"Russian (Russia)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Russian (Russia)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ru-ru","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Sakha","uniqueId":2291,"displayName":"Sakha","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Sakha","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sah-ru","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SamiInariFinland","uniqueId":2219,"displayName":"Sami, Inari (Finland)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Sami, Inari (Finland)\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"smn-fi","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SamiLuleNorway","uniqueId":2217,"displayName":"Sami, Lule (Norway)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Sami, Lule (Norway)\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"smj-no","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SamiLuleSweden","uniqueId":2218,"displayName":"Sami, Lule (Sweden)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Sami, Lule (Sweden)\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"smj-se","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SamiNorthernFinland","uniqueId":2220,"displayName":"Sami, Northern (Finland)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Sami, Northern (Finland)\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"se-fi","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SamiNorthernNorway","uniqueId":2221,"displayName":"Sami, Northern (Norway)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Sami, Northern (Norway)\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"se-no","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SamiNorthernSweden","uniqueId":2222,"displayName":"Sami, Northern (Sweden)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Sami, Northern (Sweden)\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"se-se","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SamiSkoltFinland","uniqueId":2223,"displayName":"Sami, Skolt (Finland)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Sami, Skolt (Finland)\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sms-fi","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SamiSouthernNorway","uniqueId":2215,"displayName":"Sami, Southern (Norway)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Sami, Southern (Norway)\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sma-no","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SamiSouthernSweden","uniqueId":2216,"displayName":"Sami, Southern (Sweden)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Sami, Southern (Sweden)\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sma-se","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Sanskrit","uniqueId":2224,"displayName":"Sanskrit","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Sanskrit","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sa-in","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SavenewWebpagesasWebarchives","uniqueId":2464,"displayName":"Save new Web pages as Web archives","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checked: Use Web Archive (*.mht) as the default format for the Save as Web Page command (File menu). | Unchecked: Use Web page (*.htm) as the default format for the Save as Web Page command (File menu).","supportedPlatforms":["Windows"],"tags":["Web Archives","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"savenewwebpagesaswebarchives","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ScottishGaelicUnitedKingdom","uniqueId":2135,"displayName":"Scottish Gaelic (United Kingdom)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Scottish Gaelic (United Kingdom)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"gd-gb","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Screenshot","uniqueId":2874,"displayName":"Allow users to include screenshots and attachments when they submit feedback to Microsoft","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether your users see an option to include screenshots and attachments when they submit feedback to Microsoft. Users can choose which files to include with feedback they submit to Microsoft. By default, users will see an option to include screenshots and attachments when giving feedback to Microsoft. ​\nScreenshots and attachments make feedback from users more actionable. Microsoft will use this information to improve product experiences for users, including by improving the quality of AI-generated responses and troubleshooting product issues.​\nIf you enable or don’t configure this policy setting, your users will see an option to include screenshots and attachments when they submit feedback to Microsoft. You will be able to view and manage feedback from your organization in the Microsoft 365 admin center. ​\nIf you disable this policy setting, your users will not see an option to include screenshots and attachments when they submit feedback to Microsoft.​\nNote: This policy setting has no effect if the \"Allow users to submit feedback to Microsoft\" policy setting is set to Disabled.​\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.​\nNote: The behavior outlined in this policy will take effect starting on July 21, 2023.​\n\nFor more information, see ​https://go.microsoft.com/fwlink/?linkid=2142253","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["Trust Center","Privacy","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies","Feedback","AnonymousPolicyAssignment"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\feedback","registrySubPath":"includescreenshot","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SelectDigitalSignatureHashingAlgorithm","uniqueId":1716,"displayName":"Select digital signature hashing algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SelectDigitalSignatureHashingAlgorithm;L_SelectDigitalSignatureHashingAlgorithmDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the hashing algorithm Office 2016 applications use to confirm digital signatures.\n\nIf you enable this policy setting, you can specify any of the following SHA standard functions:\n- SHA1\n- SHA256\n- SHA384\n- SHA512\n\nIf you disable or do not configure this policy setting, the default value of SHA1 is used.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SelectDigitalSignatureHashingAlgorithm;L_SelectDigitalSignatureHashingAlgorithmDropID","uniqueId":1715,"displayName":"Select digital signature hashing algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"sha1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA1","description":"","tags":[],"dependencyGroup":null},{"value":"sha256","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA256","description":"","tags":[],"dependencyGroup":null},{"value":"sha384","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA384","description":"","tags":[],"dependencyGroup":null},{"value":"sha512","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA512","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"sha1","description":"This policy setting allows you to configure the hashing algorithm Office 2016 applications use to confirm digital signatures.\n\nIf you enable this policy setting, you can specify any of the following SHA standard functions:\n- SHA1\n- SHA256\n- SHA384\n- SHA512\n\nIf you disable or do not configure this policy setting, the default value of SHA1 is used.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"signaturehashalg","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_SelectDigitalSignatureInvalidDSABits;L_SelectDigitalSignatureHashingAlgorithmDropID","uniqueId":1733,"displayName":"Configure invalid DSA public key size","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"0","description":"","tags":[],"dependencyGroup":null},{"value":512,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"512","description":"","tags":[],"dependencyGroup":null},{"value":768,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"768","description":"","tags":[],"dependencyGroup":null},{"value":1024,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1024","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to configure whether Office displays a digital signature as invalid because of the number of DSA public key bits used in the digital signature.\n\nIf you enable this policy setting, you can specify the number of bits that Office treats as invalid in a digital signature. For example: 512, 768, etc.\n\nIf you don’t configure this policy setting, Office won’t treat any digital signatures as invalid because of the number of bits in the public key.\n\nEnabling this policy causes the minimum DSA public key size to be the next largest option.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"invaliddsabits","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SelectDigitalSignatureInvalidDSABits","uniqueId":1734,"displayName":"Configure invalid DSA public key size","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SelectDigitalSignatureInvalidDSABits;L_SelectDigitalSignatureHashingAlgorithmDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure whether Office displays a digital signature as invalid because of the number of DSA public key bits used in the digital signature.\n\nIf you enable this policy setting, you can specify the number of bits that Office treats as invalid in a digital signature. For example: 512, 768, etc.\n\nIf you don’t configure this policy setting, Office won’t treat any digital signatures as invalid because of the number of bits in the public key.\n\nEnabling this policy causes the minimum DSA public key size to be the next largest option.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SelectDigitalSignatureInvalidHashingAlgorithm;L_SelectDigitalSignatureHashingAlgorithmDropID","uniqueId":1721,"displayName":"Configure invalid hashing algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"md5","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"MD5","description":"","tags":[],"dependencyGroup":null},{"value":"sha1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA1","description":"","tags":[],"dependencyGroup":null},{"value":"sha256","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA256","description":"","tags":[],"dependencyGroup":null},{"value":"sha384","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA384","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"md5","description":"This policy setting allows you to configure whether Office displays a digital signature as invalid when it contains specific hash algorithms.\n\nIf you enable this policy setting, you can specify the weakest hash algorithm that Office treats as invalid. If you enable this policy setting, you can specify any of the following algorithms:\n- MD5\n- SHA1\n- SHA256\n- SHA384\n\nIf you don’t configure this policy setting, Office won’t treat digital signatures as invalid because of the hashing algorithm.\n\nFor example, if you set MD5 as the invalid hashing algorithm Office treats MD5 signatures as invalid.\n      ","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"invalidhashalg","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_SelectDigitalSignatureInvalidHashingAlgorithm","uniqueId":1722,"displayName":"Configure invalid hashing algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SelectDigitalSignatureInvalidHashingAlgorithm;L_SelectDigitalSignatureHashingAlgorithmDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure whether Office displays a digital signature as invalid when it contains specific hash algorithms.\n\nIf you enable this policy setting, you can specify the weakest hash algorithm that Office treats as invalid. If you enable this policy setting, you can specify any of the following algorithms:\n- MD5\n- SHA1\n- SHA256\n- SHA384\n\nIf you don’t configure this policy setting, Office won’t treat digital signatures as invalid because of the hashing algorithm.\n\nFor example, if you set MD5 as the invalid hashing algorithm Office treats MD5 signatures as invalid.\n      ","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SelectDigitalSignatureInvalidRSABits;L_SelectDigitalSignatureHashingAlgorithmDropID","uniqueId":1727,"displayName":"Configure invalid RSA public key size","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"0","description":"","tags":[],"dependencyGroup":null},{"value":512,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"512","description":"","tags":[],"dependencyGroup":null},{"value":768,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"768","description":"","tags":[],"dependencyGroup":null},{"value":1024,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1024","description":"","tags":[],"dependencyGroup":null},{"value":1536,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1536","description":"","tags":[],"dependencyGroup":null},{"value":2048,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"2048","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to configure whether Office displays a digital signature as invalid because of the number of RSA public key bits used in the digital signature.\n\nIf you enable this policy setting, you can specify the number of bits that Office treats as invalid in a digital signature. For example: 512, 768, etc.\n\nIf you don’t configure this policy setting, Office won’t treat any digital signatures as invalid because of the number of bits in the public key.\n\nEnabling this policy causes the minimum RSA public key size to be the next largest option.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"invalidrsabits","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SelectDigitalSignatureInvalidRSABits","uniqueId":1728,"displayName":"Configure invalid RSA public key size","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SelectDigitalSignatureInvalidRSABits;L_SelectDigitalSignatureHashingAlgorithmDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure whether Office displays a digital signature as invalid because of the number of RSA public key bits used in the digital signature.\n\nIf you enable this policy setting, you can specify the number of bits that Office treats as invalid in a digital signature. For example: 512, 768, etc.\n\nIf you don’t configure this policy setting, Office won’t treat any digital signatures as invalid because of the number of bits in the public key.\n\nEnabling this policy causes the minimum RSA public key size to be the next largest option.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SelectDigitalSignatureLegacyDSABits;L_SelectDigitalSignatureHashingAlgorithmDropID","uniqueId":1731,"displayName":"Configure legacy DSA public key size","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"0","description":"","tags":[],"dependencyGroup":null},{"value":512,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"512","description":"","tags":[],"dependencyGroup":null},{"value":768,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"768","description":"","tags":[],"dependencyGroup":null},{"value":1024,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1024","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to configure whether Office displays a digital signature as legacy because of the number of DSA public key bits used in the digital signature.\n\nIf you enable this policy setting, you can specify the number of bits that Office treats as legacy in a digital signature. For example: 512, 768, etc.\n\nIf you don’t configure this policy setting, Office won’t treat any digital signatures as legacy because of the number of bits in the public key.\n\nEnabling this policy causes the minimum DSA public key size to be the next largest option.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"legacydsabits","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SelectDigitalSignatureLegacyDSABits","uniqueId":1732,"displayName":"Configure legacy DSA public key size","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SelectDigitalSignatureLegacyDSABits;L_SelectDigitalSignatureHashingAlgorithmDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure whether Office displays a digital signature as legacy because of the number of DSA public key bits used in the digital signature.\n\nIf you enable this policy setting, you can specify the number of bits that Office treats as legacy in a digital signature. For example: 512, 768, etc.\n\nIf you don’t configure this policy setting, Office won’t treat any digital signatures as legacy because of the number of bits in the public key.\n\nEnabling this policy causes the minimum DSA public key size to be the next largest option.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SelectDigitalSignatureLegacyHashingAlgorithm;L_SelectDigitalSignatureHashingAlgorithmDropID","uniqueId":1719,"displayName":"Configure legacy hashing algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"md5","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"MD5","description":"","tags":[],"dependencyGroup":null},{"value":"sha1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA1","description":"","tags":[],"dependencyGroup":null},{"value":"sha256","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA256","description":"","tags":[],"dependencyGroup":null},{"value":"sha384","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA384","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"md5","description":"This policy setting allows you to configure whether Office displays a digital signature as legacy when it contains specific hash algorithms.\n\nIf you enable this policy setting, you can specify the weakest hash algorithm that Office treats as legacy. You can specify any of the following algorithms:\n- MD5\n- SHA1\n- SHA256\n- SHA384\n\nIf you don’t configure this policy setting, Office treats digital signatures containing SHA1 or better as valid.\n\nFor example, if you set SHA256 as the legacy hashing algorithm, Office treats SHA384 signatures as valid.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"legacyhashalg","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_SelectDigitalSignatureLegacyHashingAlgorithm","uniqueId":1720,"displayName":"Configure legacy hashing algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SelectDigitalSignatureLegacyHashingAlgorithm;L_SelectDigitalSignatureHashingAlgorithmDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure whether Office displays a digital signature as legacy when it contains specific hash algorithms.\n\nIf you enable this policy setting, you can specify the weakest hash algorithm that Office treats as legacy. You can specify any of the following algorithms:\n- MD5\n- SHA1\n- SHA256\n- SHA384\n\nIf you don’t configure this policy setting, Office treats digital signatures containing SHA1 or better as valid.\n\nFor example, if you set SHA256 as the legacy hashing algorithm, Office treats SHA384 signatures as valid.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SelectDigitalSignatureLegacyRSABits;L_SelectDigitalSignatureHashingAlgorithmDropID","uniqueId":1725,"displayName":"Configure legacy RSA public key size","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"0","description":"","tags":[],"dependencyGroup":null},{"value":512,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"512","description":"","tags":[],"dependencyGroup":null},{"value":768,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"768","description":"","tags":[],"dependencyGroup":null},{"value":1024,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1024","description":"","tags":[],"dependencyGroup":null},{"value":1536,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1536","description":"","tags":[],"dependencyGroup":null},{"value":2048,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"2048","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to configure whether Office displays a digital signature as legacy because of the number of RSA public key bits used in the digital signature.\n\nIf you enable this policy setting, you can specify the number of bits that Office treats as legacy in a digital signature. For example: 512, 768, etc.\n\nIf you don’t configure this policy setting, Office won’t treat any digital signatures as legacy because of the number of bits in the public key.\n\nEnabling this policy causes the minimum RSA public key size to be the next largest option.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"legacyrsabits","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SelectDigitalSignatureLegacyRSABits","uniqueId":1726,"displayName":"Configure legacy RSA public key size","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SelectDigitalSignatureLegacyRSABits;L_SelectDigitalSignatureHashingAlgorithmDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure whether Office displays a digital signature as legacy because of the number of RSA public key bits used in the digital signature.\n\nIf you enable this policy setting, you can specify the number of bits that Office treats as legacy in a digital signature. For example: 512, 768, etc.\n\nIf you don’t configure this policy setting, Office won’t treat any digital signatures as legacy because of the number of bits in the public key.\n\nEnabling this policy causes the minimum RSA public key size to be the next largest option.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SelectDigitalSignatureMinDSABits;L_SelectDigitalSignatureHashingAlgorithmDropID","uniqueId":1729,"displayName":"Configure minimum DSA public key size","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"0","description":"","tags":[],"dependencyGroup":null},{"value":512,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"512","description":"","tags":[],"dependencyGroup":null},{"value":768,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"768","description":"","tags":[],"dependencyGroup":null},{"value":1024,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1024","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to configure the minimum number of DSA public key bits Office allows to create digital signatures.\n        \nIf you enable this policy setting, you can specify the minimum number of bits that can be used to create a digital signature. For example: 1024, 2048, etc.\n        \nIf you disable or don’t configure this policy setting, Office allows all DSA keys, unless the legacy or invalid DSA policy settings are configured.\n\n If the legacy or invalid DSA public key bits policy settings are configured, then the default for this setting will be the next larger value. For example, if the number of DSA public key bits is set to 768, then this setting would default to 1024.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"minsigningdsabits","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SelectDigitalSignatureMinDSABits","uniqueId":1730,"displayName":"Configure minimum DSA public key size","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SelectDigitalSignatureMinDSABits;L_SelectDigitalSignatureHashingAlgorithmDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the minimum number of DSA public key bits Office allows to create digital signatures.\n        \nIf you enable this policy setting, you can specify the minimum number of bits that can be used to create a digital signature. For example: 1024, 2048, etc.\n        \nIf you disable or don’t configure this policy setting, Office allows all DSA keys, unless the legacy or invalid DSA policy settings are configured.\n\n If the legacy or invalid DSA public key bits policy settings are configured, then the default for this setting will be the next larger value. For example, if the number of DSA public key bits is set to 768, then this setting would default to 1024.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SelectDigitalSignatureMinRSABits;L_SelectDigitalSignatureHashingAlgorithmDropID","uniqueId":1723,"displayName":"Configure minimum RSA public key size","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"0","description":"","tags":[],"dependencyGroup":null},{"value":512,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"512","description":"","tags":[],"dependencyGroup":null},{"value":768,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"768","description":"","tags":[],"dependencyGroup":null},{"value":1024,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1024","description":"","tags":[],"dependencyGroup":null},{"value":1536,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1536","description":"","tags":[],"dependencyGroup":null},{"value":2048,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"2048","description":"","tags":[],"dependencyGroup":null},{"value":4096,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"4096","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to configure the minimum number of RSA public key bits Office allows to create digital signatures.\n        \nIf you enable this policy setting, you can specify the minimum number of bits that can be used to create a digital signature. For example: 1024, 2048, etc.\n        \nIf you disable or don’t configure this policy setting, Office allows all RSA keys, unless the legacy or invalid RSA policy settings are configured.\n\n If the legacy or invalid RSA public key bits policy settings are configured, then the default for this setting will be the next larger value. For example, if the number of RSA public key bits is set to 768, then this setting would default to 1024.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"minsigningrsabits","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SelectDigitalSignatureMinRSABits","uniqueId":1724,"displayName":"Configure minimum RSA public key size","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SelectDigitalSignatureMinRSABits;L_SelectDigitalSignatureHashingAlgorithmDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the minimum number of RSA public key bits Office allows to create digital signatures.\n        \nIf you enable this policy setting, you can specify the minimum number of bits that can be used to create a digital signature. For example: 1024, 2048, etc.\n        \nIf you disable or don’t configure this policy setting, Office allows all RSA keys, unless the legacy or invalid RSA policy settings are configured.\n\n If the legacy or invalid RSA public key bits policy settings are configured, then the default for this setting will be the next larger value. For example, if the number of RSA public key bits is set to 768, then this setting would default to 1024.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SendCopilotFeedback","uniqueId":5379,"displayName":"Allow Copilot users to submit feedback to Microsoft","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy setting allows you to control whether your users can provide feedback to Microsoft about their product experiences with Copilot in Microsoft 365. Microsoft will use this feedback to improve Microsoft Copilot for users.\n\nThe ability to provide feedback is enabled by default. Users will see feedback buttons in various places in the products. Users control when they want to send feedback to Microsoft.\n\nIf you enable this policy setting, your users will be able to submit feedback about Microsoft Copilot features to Microsoft.\n\nIf you disable this policy setting, your users will not be able to submit feedback about Microsoft Copilot features to Microsoft.\n\nIf you don't configure this policy setting, the value of the policy “Allow users to submit feedback to Microsoft” will apply to feedback about Microsoft Copilot features as well as general feedback. If you don’t configure that policy setting, your users will be able to submit feedback, including feedback about Microsoft Copilot features, to Microsoft.\n\nNote: This data will be considered \"Feedback\" under your Microsoft 365 agreement, including information that would otherwise be considered \"Customer Data\" or \"Personal Data\".\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.\n\nNote: At initial release, the policy will apply only to Microsoft Copilot with Graph-grounded chat, and additional products will start respecting the policy over the following months. This policy will apply to the entirety of Copilot in Microsoft 365 by December 2024.\n\nFor more information, see https://go.microsoft.com/fwlink/?linkid=2142253 and https://go.microsoft.com/fwlink/?linkid=2250214.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["Privacy","SendCopilotFeedback","Cloud Policies Boolean","Copilot","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\feedback","registrySubPath":"sendcopilotfeedback","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Sendcustomerdata","uniqueId":1672,"displayName":"Send personal information","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can send personal information to Office. When users choose to send information Office 2016 applications automatically send information to Office.\n\nIf you enable this policy setting, users will opt into sending personal information to Office. If your organization has policies that govern the use of external resources, opting users into the program might cause them to violate these policies.\n\nIf you disable this policy setting, Office 2016 users cannot send personal information to Office.\n\nIf you do not configure this policy setting, the behavior is the equivalent of setting the policy to \"Enabled\".","supportedPlatforms":["Windows"],"tags":["Trust Center","Privacy","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"sendcustomerdata","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SendFeedback","uniqueId":2873,"displayName":"Allow users to submit feedback to Microsoft","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether your users can provide feedback to Microsoft about their product experiences with Microsoft 365 products. Microsoft will use this feedback to improve the product for users.\n\nThe ability to provide feedback is enabled by default. Users will see feedback buttons in various places in the product. Users control when they want to send feedback to Microsoft.\n\nIf you enable this policy setting, your users will be able to submit feedback to Microsoft.\n\nIf you disable this policy setting, your users will not be able to submit feedback to Microsoft.\n\nIf you don't configure this policy setting, users will be able to submit feedback to Microsoft.\n\nComing soon, you will be able to view and manage feedback from your org in the Microsoft 365 admin center.\n\nNote: This data will be considered \"Feedback\" under your Microsoft 365 agreement, including information that would otherwise be considered \"Customer Data\" or \"Personal Data\". \n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.\n\nFor more information, see https://go.microsoft.com/fwlink/?linkid=2142253","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["Trust Center","Privacy","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies","Feedback","AnonymousPolicyAssignment"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\feedback","registrySubPath":"enabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SendSurvey","uniqueId":2872,"displayName":"Allow users to receive and respond to in-product surveys from Microsoft","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether your users can receive and respond to in-product surveys in Microsoft 365 products. Microsoft will use this feedback to improve the product experience for users. The ability to receive and respond to in-product surveys is enabled by default.\n\nIf you enable this policy setting, your users will be able to receive and respond to in-product surveys about their experience using Microsoft 365 products.\n\nIf you disable this policy setting, Microsoft will not survey your users while they are using Microsoft 365 products.\n\nIf you don't configure this policy setting, your users will be able to receive and respond to in-product surveys about their experience using Microsoft 365 products.\n\nComing soon, you will be able to view and manage feedback from your org in the Microsoft 365 admin center.\n\nNote: This data will be considered \"Feedback\" under your Microsoft 365 agreement, including information that would otherwise be considered \"Customer Data\" or \"Personal Data\".\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.\n\nFor more information, see https://go.microsoft.com/fwlink/?linkid=2142253","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["Trust Center","Privacy","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies","Feedback","AnonymousPolicyAssignment"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\feedback","registrySubPath":"surveyenabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SendTelemetry","uniqueId":1674,"displayName":"Configure the level of client software diagnostic data sent by Office to Microsoft","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SendTelemetry;L_SendTelemetryDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the level of client software diagnostic data that is collected and sent to Microsoft about the Office client software running on the user's device.\n\nClient software diagnostic data is used to keep Office secure and up-to-date, detect, diagnose and remediate problems, and also make product improvements. This data does not include a user's name or email address, the content of the user's files, or information about apps unrelated to Office.\n\nIf you enable this policy setting, you must choose which level of diagnostic data is sent to Microsoft. Your choices are Required, Optional, or Neither.\n\nIf you choose Required, the minimum data needed to keep Office secure, up-to-date, and performing as expected on the device it's installed on is sent to Microsoft.\n\nIf you choose Optional, additional data that helps make product improvements and provides enhanced information to help detect, diagnose, and remediate issues is sent to Microsoft. If you choose to send optional diagnostic data, required diagnostic data is also included.\n\nIf you choose Neither, no diagnostic data about Office client software running on the user's device is sent to Microsoft. This option, however, significantly limits Microsoft's ability to detect, diagnose, and remediate problems that your users may encounter when using Office.\n\nIf you disable or don't configure this policy setting, optional diagnostic data is sent to Microsoft.\n\nFor more information, see https://go.microsoft.com/fwlink/p/?linkid=2085687","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["Trust Center","Privacy","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SendTelemetry;L_SendTelemetryDropID","uniqueId":1673,"displayName":"Level","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Neither","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Optional","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Required","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":3,"description":"This policy setting allows you to configure the level of client software diagnostic data that is collected and sent to Microsoft about the Office client software running on the user's device.\n\nClient software diagnostic data is used to keep Office secure and up-to-date, detect, diagnose and remediate problems, and also make product improvements. This data does not include a user's name or email address, the content of the user's files, or information about apps unrelated to Office.\n\nIf you enable this policy setting, you must choose which level of diagnostic data is sent to Microsoft. Your choices are Required, Optional, or Neither.\n\nIf you choose Required, the minimum data needed to keep Office secure, up-to-date, and performing as expected on the device it's installed on is sent to Microsoft.\n\nIf you choose Optional, additional data that helps make product improvements and provides enhanced information to help detect, diagnose, and remediate issues is sent to Microsoft. If you choose to send optional diagnostic data, required diagnostic data is also included.\n\nIf you choose Neither, no diagnostic data about Office client software running on the user's device is sent to Microsoft. This option, however, significantly limits Microsoft's ability to detect, diagnose, and remediate problems that your users may encounter when using Office.\n\nIf you disable or don't configure this policy setting, optional diagnostic data is sent to Microsoft.\n\nFor more information, see https://go.microsoft.com/fwlink/p/?linkid=2085687","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["Trust Center","Privacy","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\clienttelemetry","registrySubPath":"sendtelemetry","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SerbianCyrillicBosniaandHerzegovina","uniqueId":2225,"displayName":"Serbian (Cyrillic, Bosnia and Herzegovina)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Serbian (Cyrillic, Bosnia and Herzegovina)\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sr-cyrl-ba","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SerbianCyrillicMontenegro","uniqueId":2229,"displayName":"Serbian (Cyrillic, Montenegro)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Serbian (Cyrillic, Montenegro)\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sr-cyrl-me","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SerbianCyrillicSerbia","uniqueId":2228,"displayName":"Serbian (Cyrillic, Serbia)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Serbian (Cyrillic, Serbia)\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sr-cyrl-rs","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SerbianCyrillicSerbiaandMontenegro","uniqueId":2227,"displayName":"Serbian (Cyrillic, Serbia and Montenegro (Former))","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Serbian (Cyrillic, Serbia and Montenegro (Former))\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sr-cyrl-cs","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SerbianLatinBosniaandHerzegovina","uniqueId":2226,"displayName":"Serbian (Latin, Bosnia and Herzegovina)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Serbian (Latin, Bosnia and Herzegovina)\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sr-latn-ba","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SerbianLatinMontenegro","uniqueId":2232,"displayName":"Serbian (Latin, Montenegro)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Serbian (Latin, Montenegro)\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sr-latn-me","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SerbianLatinSerbia","uniqueId":2230,"displayName":"Serbian (Latin, Serbia)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Serbian (Latin, Serbia)\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sr-latn-rs","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SerbianLatinSerbiaandMontenegro","uniqueId":2231,"displayName":"Serbian (Latin, Serbia and Montenegro (Former))","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Serbian (Latin, Serbia and Montenegro (Former))\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sr-latn-cs","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ServiceLevelOptions","uniqueId":1680,"displayName":"Service Level Options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ServiceLevelOptions;L_ServiceLevelOptionsDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls the types of services that can be used by the online features of Office 2016.\n\nIf you enable this policy setting, you can choose one of three options for gating access to online services based on the owner of the service:\n\n* Office services only - Office 2016 applications on the computer communicate only with Office-owned services.  All other Microsoft or third-party service integration in Office 2016 is disabled on the computer. This is the most restrictive option.\n\n* Microsoft services only - Office 2016 applications on the computer communicate only with Microsoft-owned services.  All third-party service integration in Office 2016 is disabled on the computer.\n\n* All services - All service integration in Office 2016 is enabled on the computer.  This is also the default configuration.\n\nIf you disable or do not configure this policy setting, Office 2016 client applications allow all service integrations. Individual users can manage the set of services they use through the new My Office place in Office Backstage view.","supportedPlatforms":["Windows"],"tags":["Online Content","Tools | Options | General | Service Options...","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ServiceLevelOptions;L_ServiceLevelOptionsDropID","uniqueId":1679,"displayName":"Service Level Options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Office services only","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Microsoft services only","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"All services","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls the types of services that can be used by the online features of Office 2016.\n\nIf you enable this policy setting, you can choose one of three options for gating access to online services based on the owner of the service:\n\n* Office services only - Office 2016 applications on the computer communicate only with Office-owned services.  All other Microsoft or third-party service integration in Office 2016 is disabled on the computer. This is the most restrictive option.\n\n* Microsoft services only - Office 2016 applications on the computer communicate only with Microsoft-owned services.  All third-party service integration in Office 2016 is disabled on the computer.\n\n* All services - All service integration in Office 2016 is enabled on the computer.  This is also the default configuration.\n\nIf you disable or do not configure this policy setting, Office 2016 client applications allow all service integrations. Individual users can manage the set of services they use through the new My Office place in Office Backstage view.","supportedPlatforms":["Windows"],"tags":["Online Content","Tools | Options | General | Service Options...","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"serviceleveloptions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Sesotho","uniqueId":2233,"displayName":"Sesotho","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Sesotho","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"st-za","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SesothosaLeboa","uniqueId":2234,"displayName":"Sesotho sa Leboa","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Sesotho sa Leboa","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"nso-za","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SetCommentFieldsForOutlookContactsDictionary","uniqueId":2483,"displayName":"Set comment fields for Outlook Contacts Dictionary","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SetCommentFieldsForOutlookContactsDictionary;L_SetCommentFieldsForOutlookContactsDictionaryID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the fields to display in the comments in the Outlook Contacts Dictionary. This policy setting applies to Japanese Microsoft IME only.\n\nIf you enable this policy setting, you can specify the fields to display by setting strings, which are represented by the following identification letter IDs. You must also use any IDs/strings in the following sequence.\n\nID for each field is as follows:\na = Full Name\nc = Phonetic Name\ne = Company Name\nf = Department Name\ng = Title\nh = Office Location\nj = Email Address\nk = Business Telephone Number\nl = Business Address\n\nFor example, if you want to display Full Name, Phonetic Name and Company Name, specify 'ace'.\n\nIf you do not configure this policy setting, Full Name, Phonetic Name, Company Name, Department Name, and Job Title are displayed in the comments in this order.","supportedPlatforms":["Windows"],"tags":["IME (Japanese)","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SetCommentFieldsForOutlookContactsDictionary;L_SetCommentFieldsForOutlookContactsDictionaryID","uniqueId":2482,"displayName":"Field identification letters:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to specify the fields to display in the comments in the Outlook Contacts Dictionary. This policy setting applies to Japanese Microsoft IME only.\n\nIf you enable this policy setting, you can specify the fields to display by setting strings, which are represented by the following identification letter IDs. You must also use any IDs/strings in the following sequence.\n\nID for each field is as follows:\na = Full Name\nc = Phonetic Name\ne = Company Name\nf = Department Name\ng = Title\nh = Office Location\nj = Email Address\nk = Business Telephone Number\nl = Business Address\n\nFor example, if you want to display Full Name, Phonetic Name and Company Name, specify 'ace'.\n\nIf you do not configure this policy setting, Full Name, Phonetic Name, Company Name, Department Name, and Job Title are displayed in the comments in this order.","supportedPlatforms":["Windows"],"tags":["IME (Japanese)","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\imejp\\16.0\\wswordcomment\\plugins\\mapi","registrySubPath":"fieldsetab","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_SetCommentFieldsForOutlookGlobalAddressListDictionary","uniqueId":2481,"displayName":"Set comment fields for Outlook Global Address List Dictionary","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SetCommentFieldsForOutlookGlobalAddressListDictionary;L_SetCommentFieldsForOutlookGlobalAddressListDictionaryID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the fields to display in the comments in the Outlook Global Address List Dictionary. This policy setting applies to Japanese Microsoft IME only.\n\nIf you enable this policy setting, you can specify the fields to display by setting strings, which are represented by the following identification letter IDs. You must also use any IDs/strings in the following sequence.\n\nThe ID for each field is as follows:\na = Full Name\nc = Phonetic Name\ne = Company Name\nf = Department Name\ng = Title\nh = Office Location\nj = Email Address\nk = Business Telephone Number\nl = Business Address\n\nFor example, if you want to display Full Name, Phonetic Name and Company Name, specify 'ace'.\n\nIf you do not configure this policy setting, Full Name, Phonetic Name, Department Name, Job Title and Office Location are displayed in the comments, in this order.","supportedPlatforms":["Windows"],"tags":["IME (Japanese)","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SetCommentFieldsForOutlookGlobalAddressListDictionary;L_SetCommentFieldsForOutlookGlobalAddressListDictionaryID","uniqueId":2480,"displayName":"Field identification letters:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to specify the fields to display in the comments in the Outlook Global Address List Dictionary. This policy setting applies to Japanese Microsoft IME only.\n\nIf you enable this policy setting, you can specify the fields to display by setting strings, which are represented by the following identification letter IDs. You must also use any IDs/strings in the following sequence.\n\nThe ID for each field is as follows:\na = Full Name\nc = Phonetic Name\ne = Company Name\nf = Department Name\ng = Title\nh = Office Location\nj = Email Address\nk = Business Telephone Number\nl = Business Address\n\nFor example, if you want to display Full Name, Phonetic Name and Company Name, specify 'ace'.\n\nIf you do not configure this policy setting, Full Name, Phonetic Name, Department Name, Job Title and Office Location are displayed in the comments, in this order.","supportedPlatforms":["Windows"],"tags":["IME (Japanese)","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\imejp\\16.0\\wswordcomment\\plugins\\mapi","registrySubPath":"fieldsetad","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_Setdefaultimagedirctory","uniqueId":2502,"displayName":"Set default image directory","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Setdefaultimagedirctory;L_SetdefaultimagedirctoryPart","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the default directory for signing images (defaults to your pictures otherwise).","supportedPlatforms":["Windows"],"tags":["Signing","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Setdefaultimagedirctory;L_SetdefaultimagedirctoryPart","uniqueId":2501,"displayName":"Last-used signature image directory:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Sets the default directory for signing images (defaults to your pictures otherwise).","supportedPlatforms":["Windows"],"tags":["Signing","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"signatureimageurl","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_SetDocumentSynchronizationTimeout","uniqueId":2460,"displayName":"Set document synchronization timeout","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SetDocumentSynchronizationTimeout;L_SetDocumentSynchronizationTimeoutSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the server timeout value in milliseconds for document synchronization. This policy setting does not apply when synchronizing documents on SharePoint servers. \n\nIf you enable this policy setting, you may specify the server timeout value in milliseconds for document synchronization.\n\nIf you disable or do not configure this policy setting, the server timeout will default to the Windows timeout value.\n","supportedPlatforms":["Windows"],"tags":["Co-authoring","Collaboration Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SetDocumentSynchronizationTimeout;L_SetDocumentSynchronizationTimeoutSpinID","uniqueId":2459,"displayName":"in milliseconds:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":4000000000},"dataType":"Integer"},"defaultValue":"60000","description":"This policy setting specifies the server timeout value in milliseconds for document synchronization. This policy setting does not apply when synchronizing documents on SharePoint servers. \n\nIf you enable this policy setting, you may specify the server timeout value in milliseconds for document synchronization.\n\nIf you disable or do not configure this policy setting, the server timeout will default to the Windows timeout value.\n","supportedPlatforms":["Windows"],"tags":["Co-authoring","Collaboration Settings","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"documentsynctimeout","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SetdownloadlocationforNET20frameworkLP;L_empty435","uniqueId":2599,"displayName":"Set download location for Microsoft .NET Framework 2.0 Language Pack","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Set a custom path to where users can access the missing component.","supportedPlatforms":["Windows"],"tags":["Downloading Framework Components","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"missingclr20langpackredirect","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_SetdownloadlocationforNET20frameworkLP","uniqueId":2600,"displayName":"Set download location for Microsoft .NET Framework 2.0 Language Pack","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SetdownloadlocationforNET20frameworkLP;L_empty435","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Set a custom path to where users can access the missing component.","supportedPlatforms":["Windows"],"tags":["Downloading Framework Components","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SetdownloadlocationforNET20framework;L_empty434","uniqueId":2597,"displayName":"Set download location for Microsoft .NET Framework 2.0","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Set a custom path to where users can access the missing component.","supportedPlatforms":["Windows"],"tags":["Downloading Framework Components","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"missingclr20redirect","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_SetdownloadlocationforNET20framework","uniqueId":2598,"displayName":"Set download location for Microsoft .NET Framework 2.0","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SetdownloadlocationforNET20framework;L_empty434","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Set a custom path to where users can access the missing component.","supportedPlatforms":["Windows"],"tags":["Downloading Framework Components","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SetMinimumPasswordLength","uniqueId":1747,"displayName":"Set minimum password length","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SetMinimumPasswordLength;L_SetMinimumPasswordLengthSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This setting will define what the minimum length a password should be when the local policy is enforced.\n\nIf you enable this policy setting, you may specify the minimum password length.  The valid range is between 0 and 255.\n\nIf you disable or do not configure this policy setting, the default minimum password length is 0 characters.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SetMinimumPasswordLength;L_SetMinimumPasswordLengthSpinID","uniqueId":1746,"displayName":"Minimum password length","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":255},"dataType":"Integer"},"defaultValue":"0","description":"This setting will define what the minimum length a password should be when the local policy is enforced.\n\nIf you enable this policy setting, you may specify the minimum password length.  The valid range is between 0 and 255.\n\nIf you disable or do not configure this policy setting, the default minimum password length is 0 characters.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\passwordcomplexity","registrySubPath":"minlength","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SetPasswordHashFormatAsISOCompliant","uniqueId":1705,"displayName":"Set password hash format as ISO-compliant","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you create ISO-compliant modification password records.\n\nIf you enable this policy setting, then passwords created will be ISO-compliant.\n\nIf you disable or do not configure this policy setting, the default will be ECMA-style records.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security","registrySubPath":"useisopasswordverifier","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SetPasswordRulesDomainTimeout","uniqueId":1751,"displayName":"Set password rules domain timeout","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SetPasswordRulesDomainTimeout;L_SetPasswordRulesDomainTimeoutSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting will define how long in milliseconds to wait when contacting a domain controller before timing out.  This requires the \"Set password rules level\" to be enabled and set to \"Local length, local complexity, and domain policy checks.\"\n\nIf you enable this policy setting, you may set how long in milliseconds to wait when contacting a domain controller before timing out.\n\nIf you disable or do not configure this policy setting, the default value of 4000 milliseconds is used.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SetPasswordRulesDomainTimeout;L_SetPasswordRulesDomainTimeoutSpinID","uniqueId":1750,"displayName":"in milliseconds","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":20000},"dataType":"Integer"},"defaultValue":"4000","description":"This policy setting will define how long in milliseconds to wait when contacting a domain controller before timing out.  This requires the \"Set password rules level\" to be enabled and set to \"Local length, local complexity, and domain policy checks.\"\n\nIf you enable this policy setting, you may set how long in milliseconds to wait when contacting a domain controller before timing out.\n\nIf you disable or do not configure this policy setting, the default value of 4000 milliseconds is used.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\passwordcomplexity","registrySubPath":"timeout","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SetPasswordRulesLevel","uniqueId":1749,"displayName":"Set password rules level","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SetPasswordRulesLevel;L_SetPasswordRulesLevelDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to set the password rules level.\n\nIf you enable this policy setting, you may specify a password rules level:\n\n- No password checks: There are no complexity checks\n- Local length check: Minimum length checks\n- Local length and complexity checks: Minimum length checks plus 3 of 4 character groups checks.\n- Local length, local complexity, and domain policy checks: All the previous checks plus Windows domain password rules enforced.\n\nIf you select \"Local length and complexity checks\" or \"Local length, local complexity, and domain policy checks,\" then the password must contain characters from at least three of four character sets: lowercase a-z, uppercase A-Z, digits 0-9, or non-alphabetic characters.  When this complexity is enforced, the minimum password length needs to be at least 6, but can be more depending on the value set in the \"Set minimum password length\" policy setting.\n\nIf you select \"Local length, local complexity, and domain policy checks,\" then Microsoft Office will use the Windows domain policy as well as all the settings \"Local length and complexity checks.\"  This allows a custom password filter that is installed for Windows passwords to be used.  If you are offline or a domain controller cannot be contacted, then the Windows password settings are not used, and only the \"Local length and complexity checks\" settings are used.  If you don’t have a custom password filter, then \"Local length and complexity checks\" saves a trip across the network and would be the best choice.\n\nIf you disable or do not configure this policy setting, the behavior is the same as if this policy setting were enabled and \"No password checks\" selected.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SetPasswordRulesLevel;L_SetPasswordRulesLevelDropID","uniqueId":1748,"displayName":"Set password rules level","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No password checks","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Local length check","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Local length and complexity checks","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Local length, local complexity, and domain policy checks","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to set the password rules level.\n\nIf you enable this policy setting, you may specify a password rules level:\n\n- No password checks: There are no complexity checks\n- Local length check: Minimum length checks\n- Local length and complexity checks: Minimum length checks plus 3 of 4 character groups checks.\n- Local length, local complexity, and domain policy checks: All the previous checks plus Windows domain password rules enforced.\n\nIf you select \"Local length and complexity checks\" or \"Local length, local complexity, and domain policy checks,\" then the password must contain characters from at least three of four character sets: lowercase a-z, uppercase A-Z, digits 0-9, or non-alphabetic characters.  When this complexity is enforced, the minimum password length needs to be at least 6, but can be more depending on the value set in the \"Set minimum password length\" policy setting.\n\nIf you select \"Local length, local complexity, and domain policy checks,\" then Microsoft Office will use the Windows domain policy as well as all the settings \"Local length and complexity checks.\"  This allows a custom password filter that is installed for Windows passwords to be used.  If you are offline or a domain controller cannot be contacted, then the Windows password settings are not used, and only the \"Local length and complexity checks\" settings are used.  If you don’t have a custom password filter, then \"Local length and complexity checks\" saves a trip across the network and would be the best choice.\n\nIf you disable or do not configure this policy setting, the behavior is the same as if this policy setting were enabled and \"No password checks\" selected.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\passwordcomplexity","registrySubPath":"policylevel","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SetSignatureVerificationLevel","uniqueId":1742,"displayName":"Set signature verification level","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SetSignatureVerificationLevel;L_SetSignatureVerificationLevelDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to set the verification level used by Office 2016 applications when validating a digital signature.\n\nNote: Enabling this policy setting is not recommended for subscription versions of Office, such as Microsoft 365 Apps for enterprise, because it will use the legacy registry based rules settings (described below) instead of basing the verification level on the Office version that signed the file.\n\nIf you enable this policy setting, you can set the verification level to any of the following:\n\n- No rules: Office 2016 digital signature rules are disabled.\n\n- Office 2007 rules: Office 2016 uses the Office 2007 digital signature rules.\n\n- Office 2010 rules: Office 2016 uses the Office 2010 digital signature rules.\n\n- Office 2013 rules: Office 2016 uses the Office 2013 digital signature rules.\n\nIf you disable or do not configure this policy setting, subscription versions of Office 2016 use the rules of the Office version that was used to sign the document to validate the digital signature.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SetSignatureVerificationLevel;L_SetSignatureVerificationLevelDropID","uniqueId":1741,"displayName":"Set signature verification level","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No rules","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Office 2007 rules","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Office 2010 rules","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Office 2013 rules","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This policy setting allows you to set the verification level used by Office 2016 applications when validating a digital signature.\n\nNote: Enabling this policy setting is not recommended for subscription versions of Office, such as Microsoft 365 Apps for enterprise, because it will use the legacy registry based rules settings (described below) instead of basing the verification level on the Office version that signed the file.\n\nIf you enable this policy setting, you can set the verification level to any of the following:\n\n- No rules: Office 2016 digital signature rules are disabled.\n\n- Office 2007 rules: Office 2016 uses the Office 2007 digital signature rules.\n\n- Office 2010 rules: Office 2016 uses the Office 2010 digital signature rules.\n\n- Office 2013 rules: Office 2016 uses the Office 2013 digital signature rules.\n\nIf you disable or do not configure this policy setting, subscription versions of Office 2016 use the rules of the Office version that was used to sign the document to validate the digital signature.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"verifyversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Setswana","uniqueId":2235,"displayName":"Setswana","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Setswana","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"tn-za","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SetTimestampServerTimeout","uniqueId":1740,"displayName":"Set timestamp server timeout","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SetTimestampServerTimeout;L_SetTimestampServerTimeoutSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the number of seconds Office 2016 applications wait for a response from the time stamping server before timing out.  If timeout occurs, the Office 2016 application will not open the message or document.\n\nIf you enable this policy setting, the number of seconds you specify will be the length of time Office 2016 will wait for the time stamping server to return a result.\n\nIf you disable or do not configure this policy setting, the default of 5 seconds will be used.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SetTimestampServerTimeout;L_SetTimestampServerTimeoutSpinID","uniqueId":1739,"displayName":"In seconds","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":500},"dataType":"Integer"},"defaultValue":"5","description":"This policy setting allows you to configure the number of seconds Office 2016 applications wait for a response from the time stamping server before timing out.  If timeout occurs, the Office 2016 application will not open the message or document.\n\nIf you enable this policy setting, the number of seconds you specify will be the length of time Office 2016 will wait for the time stamping server to return a result.\n\nIf you disable or do not configure this policy setting, the default of 5 seconds will be used.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"tsatimeout","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SetUpdateIntervalForOutlookContactsDictionary","uniqueId":2479,"displayName":"Set update interval for Outlook Contacts Dictionary","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SetUpdateIntervalForOutlookContactsDictionary;L_SetUpdateIntervalForOutlookContactsDictionarySpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the update interval for the Outlook Contacts Dictionary. This policy setting applies to Japanese Microsoft IME only.\n\nIf you enable this policy setting, you can specify the update interval.  For example, if you specify \"720,\" the Outlook Contacts Dictionary is updated every 720 minutes.\n\nIf you do not configure this policy setting, the Outlook Contacts Dictionary is updated every 1440 minutes (24 hours).","supportedPlatforms":["Windows"],"tags":["IME (Japanese)","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SetUpdateIntervalForOutlookContactsDictionary;L_SetUpdateIntervalForOutlookContactsDictionarySpinID","uniqueId":2478,"displayName":"(in minutes)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":100000},"dataType":"Integer"},"defaultValue":"1440","description":"This policy setting allows you to specify the update interval for the Outlook Contacts Dictionary. This policy setting applies to Japanese Microsoft IME only.\n\nIf you enable this policy setting, you can specify the update interval.  For example, if you specify \"720,\" the Outlook Contacts Dictionary is updated every 720 minutes.\n\nIf you do not configure this policy setting, the Outlook Contacts Dictionary is updated every 1440 minutes (24 hours).","supportedPlatforms":["Windows"],"tags":["IME (Japanese)","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\imejp\\16.0\\wswordcomment\\plugins\\mapi","registrySubPath":"updatespanab","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SetUpdateIntervalForOutlookGlobalAddressListDictionary","uniqueId":2477,"displayName":"Set update interval for Outlook Global Address List Dictionary","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SetUpdateIntervalForOutlookGlobalAddressListDictionary;L_SetUpdateIntervalForOutlookGlobalAddressListDictionarySpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the update interval for the Outlook Global Address List Dictionary. This policy setting applies to Japanese Microsoft IME only.\n\n\nIf you enable this policy setting, you can specify the update interval in minutes.  For example, if you specify \"720,\" the Outlook Global Address List Dictionary is updated every 720 minutes.\n\nIf you do not configure this policy setting, the Outlook Global Address List Dictionary is updated every 1440 minutes (24 hours).","supportedPlatforms":["Windows"],"tags":["IME (Japanese)","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SetUpdateIntervalForOutlookGlobalAddressListDictionary;L_SetUpdateIntervalForOutlookGlobalAddressListDictionarySpinID","uniqueId":2476,"displayName":"(in minutes)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":100000},"dataType":"Integer"},"defaultValue":"1440","description":"This policy setting allows you to specify the update interval for the Outlook Global Address List Dictionary. This policy setting applies to Japanese Microsoft IME only.\n\n\nIf you enable this policy setting, you can specify the update interval in minutes.  For example, if you specify \"720,\" the Outlook Global Address List Dictionary is updated every 720 minutes.\n\nIf you do not configure this policy setting, the Outlook Global Address List Dictionary is updated every 1440 minutes (24 hours).","supportedPlatforms":["Windows"],"tags":["IME (Japanese)","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\imejp\\16.0\\wswordcomment\\plugins\\mapi","registrySubPath":"updatespanad","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SetUserPathForTheLabelPageSizeUpdateFiles","uniqueId":2022,"displayName":"Set User path for the label page size update files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SetUserPathForTheLabelPageSizeUpdateFiles;L_SetUserPathForTheLabelPageSizeUpdateFilesID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to override the User path for the label page size update files. \n\nIf you enable this policy setting, you may enter the path to the PSX update files and override the User path.\n\nIf you disable or do not configure this policy setting, the User path for the label page size update files remains valid.","supportedPlatforms":["Windows"],"tags":["Shared paths","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SetUserPathForTheLabelPageSizeUpdateFiles;L_SetUserPathForTheLabelPageSizeUpdateFilesID","uniqueId":2021,"displayName":"User path:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to override the User path for the label page size update files. \n\nIf you enable this policy setting, you may enter the path to the PSX update files and override the User path.\n\nIf you disable or do not configure this policy setting, the User path for the label page size update files remains valid.","supportedPlatforms":["Windows"],"tags":["Shared paths","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"userpagesize","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_SetWorkgroupPathForLabelPageSizeUpdateFiles","uniqueId":2018,"displayName":"Set Workgroup path for label page size update files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SetWorkgroupPathForLabelPageSizeUpdateFiles;L_SetWorkgroupPathForLabelPageSizeUpdateFilesID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the Workgroup path for the label page size update files. This is useful if the organization has a centralized template depot. \n\nIf you enable this policy setting, you may enter the path to the PSX update files.\n\nIf you disable or do not configure this policy setting, there is no Workgroup path for the shared label templates.","supportedPlatforms":["Windows"],"tags":["Shared paths","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SetWorkgroupPathForLabelPageSizeUpdateFiles;L_SetWorkgroupPathForLabelPageSizeUpdateFilesID","uniqueId":2017,"displayName":"Workgroup path:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to specify the Workgroup path for the label page size update files. This is useful if the organization has a centralized template depot. \n\nIf you enable this policy setting, you may enter the path to the PSX update files.\n\nIf you disable or do not configure this policy setting, there is no Workgroup path for the shared label templates.","supportedPlatforms":["Windows"],"tags":["Shared paths","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"sharedpagesize","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_Sharedthemespath","uniqueId":2028,"displayName":"Shared themes path","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Sharedthemespath;L_sharedthemespath330","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the location of workgroup themes.","supportedPlatforms":["Windows"],"tags":["Shared paths","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Sharedthemespath;L_sharedthemespath330","uniqueId":2027,"displayName":"Shared themes path","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specifies the location of workgroup themes.","supportedPlatforms":["Windows"],"tags":["Shared paths","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"workgroupthemes","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_ShowAutoCorrectOptionsbuttons","uniqueId":1649,"displayName":"Show AutoCorrect Options buttons","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Tools | AutoCorrect Options... (Excel, PowerPoint and Access)","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\autocorrect","registrySubPath":"acoptions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ShownFileFmtPrompt","uniqueId":2880,"displayName":"Show the File Format dialog","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether the file format dialog has already been shown to the user. If you enable this policy setting, the dialog won't be shown again. If you disable this policy setting, the dialog prompts the user to select a default file format on each boot until one is selected. If you don't configure this policy setting, the dialog prompts the user to select a default file format on each boot until one is selected.","supportedPlatforms":["Windows"],"tags":["Trust Center","Privacy","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\registration","registrySubPath":"shownfilefmtpromptpolicy","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ShowPasteOptionsbuttons","uniqueId":2717,"displayName":"Show Paste Options button when content is pasted","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting configures the Paste Options button.\n\nIf you enable this policy setting, the Paste Options button is displayed after content is pasted.\n\nIf you disable or do not configure this policy setting, the Paste Options button is not displayed.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"pasteoptions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ShowScreenTips","uniqueId":1539,"displayName":"Show Screen Tips","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ShowScreenTips;L_ShowScreenTipsDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether Office applications display screen tips when users hover on commands on the Office Ribbon, and whether the screen tips display feature names and descriptions, or just feature names.  \n\nIf you enable this policy setting, you can select any of the following options:\n- Show feature descriptions: Both feature names and descriptions appear when users hover over commands on the Ribbon. \n- Don't show feature descriptions: Only feature names appear when users hover over commands on the Ribbon. \n- Don't show screen tips: Nothing appears when users hover over commands on the Ribbon.\n\nIf you disable this policy setting, nothing appears when users hover over commands on the Office Ribbon.\n\nIf you do not configure this policy setting, both feature names and descriptions appear when users hover over commands on the Office Ribbon.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ShowScreenTips;L_ShowScreenTipsDropID","uniqueId":1538,"displayName":"Show Screen Tips","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Show feature descriptions","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Don't show feature descriptions","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Don't show screentips","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether Office applications display screen tips when users hover on commands on the Office Ribbon, and whether the screen tips display feature names and descriptions, or just feature names.  \n\nIf you enable this policy setting, you can select any of the following options:\n- Show feature descriptions: Both feature names and descriptions appear when users hover over commands on the Ribbon. \n- Don't show feature descriptions: Only feature names appear when users hover over commands on the Ribbon. \n- Don't show screen tips: Nothing appears when users hover over commands on the Ribbon.\n\nIf you disable this policy setting, nothing appears when users hover over commands on the Office Ribbon.\n\nIf you do not configure this policy setting, both feature names and descriptions appear when users hover over commands on the Office Ribbon.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars","registrySubPath":"screentipscheme","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ShowshortcutkeysinScreenTips","uniqueId":1590,"displayName":"Show shortcut keys in ScreenTips","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Customize","Global Options","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars","registrySubPath":"showkbdshortcuts","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ShowSkyDriveSignIn","uniqueId":2878,"displayName":"Show OneDrive Sign In","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Prompt user to sign in to OneDrive while performing a file save operation.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"skydrivesigninoption","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SignInOptions","uniqueId":2883,"displayName":"Block signing into Office","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SignInOptions;L_SignInOptions5","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls whether users can provide credentials to Office using either their Microsoft Account or the user ID assigned by your organization for accessing Office 365.\nIf you enable this policy setting, you can specify one of the following options:\n\n- If you select \"Both IDs allowed\", users can sign in and access Office content by using either ID\n- If you select \"Organization only\", users can sign in only by using the user ID assigned by your organization for accessing Office 365.\n\nIf you disable or do not configure this policy setting, users can sign in by using either ID.\n      ","supportedPlatforms":["Windows","Android"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies","Copilot"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SignInOptions;L_SignInOptions5","uniqueId":2882,"displayName":"Block signing into Office","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Both IDs allowed","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Org ID only","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls whether users can provide credentials to Office using either their Microsoft Account or the user ID assigned by your organization for accessing Office 365.\nIf you enable this policy setting, you can specify one of the following options:\n\n- If you select \"Both IDs allowed\", users can sign in and access Office content by using either ID\n- If you select \"Organization only\", users can sign in only by using the user ID assigned by your organization for accessing Office 365.\n\nIf you disable or do not configure this policy setting, users can sign in by using either ID.\n      ","supportedPlatforms":["Windows","Android"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite","Copilot"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signin","registrySubPath":"signinoptions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SindhiArabic","uniqueId":2237,"displayName":"Sindhi (Arabic)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Sindhi (Arabic)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sd-arab-pk","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SindhiDevanagari","uniqueId":2236,"displayName":"Sindhi (Devanagari)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Sindhi (Devanagari)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sd-deva-in","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Sinhala","uniqueId":2238,"displayName":"Sinhala","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Sinhala","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"si-lk","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Site1;L_Name","uniqueId":1597,"displayName":"Name: ","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specifies the name and URL of a shared workspace. The name and URL appear in the Document Management pane.","supportedPlatforms":["Windows"],"tags":["Define Shared Workspace URL's","Shared Workspace","Customize","Global Options","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\sharepointtracking\\name0","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_Site1","uniqueId":1599,"displayName":"Site 1: ","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Site1;L_Name","logicalOperator":"exists","values":null},{"dependee":"office16;L_Site1;L_URL","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the name and URL of a shared workspace. The name and URL appear in the Document Management pane.","supportedPlatforms":["Windows"],"tags":["Define Shared Workspace URL's","Shared Workspace","Customize","Global Options","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Site1;L_URL","uniqueId":1598,"displayName":"URL: ","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specifies the name and URL of a shared workspace. The name and URL appear in the Document Management pane.","supportedPlatforms":["Windows"],"tags":["Define Shared Workspace URL's","Shared Workspace","Customize","Global Options","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\sharepointtracking\\name0","registrySubPath":"url","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_SleepInterval","uniqueId":2567,"displayName":"Set maximum sleep interval","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SleepInterval;L_SleepIntervalDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting  allows you to set an upper limit on the sleep interval used by the cache.  The sleep is automatically interrupted when any application made changes in the cache or if there is an action scheduled to be performed.\n    \nIf you enable this policy setting, you may specify how long (in minutes) the synchronization should wait before resuming when there is no pending work to do.\n\nIf you disable or do not configure this policy setting, then a default value of 20 minutes will be used.","supportedPlatforms":["Windows"],"tags":["Synchronization","Business Data","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SleepInterval;L_SleepIntervalDecimal","uniqueId":2566,"displayName":"Sleep interval upper limit (minutes)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":360},"dataType":"Integer"},"description":"This policy setting  allows you to set an upper limit on the sleep interval used by the cache.  The sleep is automatically interrupted when any application made changes in the cache or if there is an action scheduled to be performed.\n    \nIf you enable this policy setting, you may specify how long (in minutes) the synchronization should wait before resuming when there is no pending work to do.\n\nIf you disable or do not configure this policy setting, then a default value of 20 minutes will be used.","supportedPlatforms":["Windows"],"tags":["Synchronization","Business Data","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\business data\\synchronization","registrySubPath":"sleep interval","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Slovak","uniqueId":2239,"displayName":"Slovak","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Slovak","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sk-sk","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Slovenian","uniqueId":2240,"displayName":"Slovenian","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Slovenian","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sl-si","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Somali","uniqueId":2241,"displayName":"Somali","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Somali","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"so-so","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpanishArgentina","uniqueId":2244,"displayName":"Spanish (Argentina)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Spanish (Argentina)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"es-ar","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpanishBolivia","uniqueId":2245,"displayName":"Spanish (Bolivia)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Spanish (Bolivia)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"es-bo","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpanishChile","uniqueId":2246,"displayName":"Spanish (Chile)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Spanish (Chile)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"es-cl","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpanishColombia","uniqueId":2247,"displayName":"Spanish (Colombia)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Spanish (Colombia)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"es-co","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpanishCostaRica","uniqueId":2248,"displayName":"Spanish (Costa Rica)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Spanish (Costa Rica)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"es-cr","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpanishDominicanRepublic","uniqueId":2249,"displayName":"Spanish (Dominican Republic)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Spanish (Dominican Republic)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"es-do","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpanishEcuador","uniqueId":2250,"displayName":"Spanish (Ecuador)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Spanish (Ecuador)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"es-ec","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpanishElSalvador","uniqueId":2251,"displayName":"Spanish (El Salvador)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Spanish (El Salvador)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"es-sv","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpanishGuatemala","uniqueId":2252,"displayName":"Spanish (Guatemala)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Spanish (Guatemala)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"es-gt","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpanishHonduras","uniqueId":2253,"displayName":"Spanish (Honduras)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Spanish (Honduras)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"es-hn","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpanishMexico","uniqueId":2254,"displayName":"Spanish (Mexico)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Spanish (Mexico)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"es-mx","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpanishNicaragua","uniqueId":2255,"displayName":"Spanish (Nicaragua)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Spanish (Nicaragua)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"es-ni","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpanishPanama","uniqueId":2256,"displayName":"Spanish (Panama)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Spanish (Panama)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"es-pa","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpanishParaguay","uniqueId":2257,"displayName":"Spanish (Paraguay)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Spanish (Paraguay)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"es-py","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpanishPeru","uniqueId":2258,"displayName":"Spanish (Peru)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Spanish (Peru)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"es-pe","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpanishPuertoRico","uniqueId":2259,"displayName":"Spanish (Puerto Rico)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Spanish (Puerto Rico)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"es-pr","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpanishSpain","uniqueId":2260,"displayName":"Spanish (Spain)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Spanish (Spain)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"es-es","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpanishUnitedStates","uniqueId":2261,"displayName":"Spanish (United States)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Spanish (United States)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"es-us","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpanishUruguay","uniqueId":2262,"displayName":"Spanish (Uruguay)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Spanish (Uruguay)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"es-uy","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpanishVenezuela","uniqueId":2263,"displayName":"Spanish (Venezuela)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Spanish (Venezuela)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"es-ve","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpecifyDefaultPermissionServer;L_empty407","uniqueId":2499,"displayName":"Specify Permission Policy Default Server for Quick Access Toolbar","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting specifies the RMS server Office uses by default.\n\nIf you enable this policy setting, Office uses the server you specify as the default RMS server.\n\nIf you disable or do not configure this policy setting, Office chooses the default RMS server.","supportedPlatforms":["Windows"],"tags":["Manage Restricted Permissions","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\drm","registrySubPath":"defaultserver","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_SpecifyDefaultPermissionServer","uniqueId":2500,"displayName":"Specify Permission Policy Default Server for Quick Access Toolbar","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SpecifyDefaultPermissionServer;L_empty407","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the RMS server Office uses by default.\n\nIf you enable this policy setting, Office uses the server you specify as the default RMS server.\n\nIf you disable or do not configure this policy setting, Office chooses the default RMS server.","supportedPlatforms":["Windows"],"tags":["Manage Restricted Permissions","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SpecifyIssuerFilter","uniqueId":1736,"displayName":"Specify filtering for certificate issuers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SpecifyIssuerFilter;L_SpecifyIssuerFilterID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure Office to only allow certificates from a specific issuer when creating a digital signature.\n      \nIf you enable this policy setting, Office only displays certificates that contain the string you set in the policy. This setting is case-sensitive.\n\nFor example, a setting of \"MyCA\" would match an issuer of \"MyCA 1\"and \"MyCA 2\", but not \"MYCA 3\".\n\nIf you disable or don’t configure this setting, then signing certificates from any issuer can be used.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SpecifyIssuerFilter;L_SpecifyIssuerFilterID","uniqueId":1735,"displayName":"Specify filtering for certificate issuers","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to configure Office to only allow certificates from a specific issuer when creating a digital signature.\n      \nIf you enable this policy setting, Office only displays certificates that contain the string you set in the policy. This setting is case-sensitive.\n\nFor example, a setting of \"MyCA\" would match an issuer of \"MyCA 1\"and \"MyCA 2\", but not \"MYCA 3\".\n\nIf you disable or don’t configure this setting, then signing certificates from any issuer can be used.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"filterissuer","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_SpecifyMinimumXAdESLevelForDigitalSignatureGeneration","uniqueId":1711,"displayName":"Specify minimum XAdES level for digital signature generation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SpecifyMinimumXAdESLevelForDigitalSignatureGeneration;L_SpecifyMinimumXAdESLevelForDigitalSignatureGenerationDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting  lets you  specify a minimum XAdES level that Office 2016 applications must reach in order to create an XAdES digital signature. If unable to reach the minimum XAdESLevel, the Office application fails to create the signature.  \n\nIf you enable this policy setting, you can set the following minimum XAdES levels that must be met by the Office application before creating the digital signature.\n\n- No minimum level\n- XAdES-BES: Must create at least XAdES-BES or fail\n- XAdES-T: Must create at least XAdES-T (timestamp) or fail. \n- XAdES-C: Must create at least XAdES-C (certificate and revocation references) or fail. \n- XAdES-X: Must create at least XAdES-X (timestamp -C) or fail. \n- XAdES-X-L: Must create at least XAdES-X-L (store certificate and revocation values) or fail.\n\nIf you disable or do not configure this policy setting, Office 2016 does not require a minimum XAdES level and creates the most advanced XAdES signature possible, up to the level specified in the policy setting","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SpecifyMinimumXAdESLevelForDigitalSignatureGeneration;L_SpecifyMinimumXAdESLevelForDigitalSignatureGenerationDropID","uniqueId":1710,"displayName":"Specify minimum XAdES level for digital signature generation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No minimum level","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"XAdES-BES","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"XAdES-T","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"XAdES-C","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"XAdES-X","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"XAdES-X-L","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting  lets you  specify a minimum XAdES level that Office 2016 applications must reach in order to create an XAdES digital signature. If unable to reach the minimum XAdESLevel, the Office application fails to create the signature.  \n\nIf you enable this policy setting, you can set the following minimum XAdES levels that must be met by the Office application before creating the digital signature.\n\n- No minimum level\n- XAdES-BES: Must create at least XAdES-BES or fail\n- XAdES-T: Must create at least XAdES-T (timestamp) or fail. \n- XAdES-C: Must create at least XAdES-C (certificate and revocation references) or fail. \n- XAdES-X: Must create at least XAdES-X (timestamp -C) or fail. \n- XAdES-X-L: Must create at least XAdES-X-L (store certificate and revocation values) or fail.\n\nIf you disable or do not configure this policy setting, Office 2016 does not require a minimum XAdES level and creates the most advanced XAdES signature possible, up to the level specified in the policy setting","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"minxadeslevel","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SpecifyTimestampServerName","uniqueId":1738,"displayName":"Specify timestamp server name","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SpecifyTimestampServerName;L_SpecifyTimestampServerNameID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to set the HTTP URL for the timestamp server used by Office 2016 applications in the process of validating messages or documents.\n\nIf you enable this policy setting, you must provide a valid HTTP URL address for the timestamp server.  \n\nIf you do disable or not configure this policy setting, a timestamp server will not be used.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_SpecifyTimestampServerName;L_SpecifyTimestampServerNameID","uniqueId":1737,"displayName":"Specify timestamp server name","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to set the HTTP URL for the timestamp server used by Office 2016 applications in the process of validating messages or documents.\n\nIf you enable this policy setting, you must provide a valid HTTP URL address for the timestamp server.  \n\nIf you do disable or not configure this policy setting, a timestamp server will not be used.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"tsalocation","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_Specifytypesoffixedformatoptionsavailabletotheuser;L_empty418","uniqueId":2512,"displayName":"Disable Microsoft Save As PDF and XPS add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Default","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable XPS","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable PDF","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable XPS and PDF","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Allows the user or administrator to specify which of the installed Microsoft PDF and XPS add-ins are available. \n\nWhen this setting is not configured, installed Microsoft PDF and XPS add-ins are visible to users. \n\nDefault: same as not configured. \n\nDisable XPS: Hides and disables the Microsoft Save As XPS add-in. \n\nDisable PDF: Hides and disables the Microsoft Save As PDF add-in. \n\nDisable XPS and PDF: Hides and disables both the Microsoft Save As PDF and Save As XPS add-ins.","supportedPlatforms":["Windows"],"tags":["Microsoft Save As PDF and XPS add-ins","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\fixedformat","registrySubPath":"disablepublishtofixedformat","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Specifytypesoffixedformatoptionsavailabletotheuser","uniqueId":2513,"displayName":"Disable Microsoft Save As PDF and XPS add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Specifytypesoffixedformatoptionsavailabletotheuser;L_empty418","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Allows the user or administrator to specify which of the installed Microsoft PDF and XPS add-ins are available. \n\nWhen this setting is not configured, installed Microsoft PDF and XPS add-ins are visible to users. \n\nDefault: same as not configured. \n\nDisable XPS: Hides and disables the Microsoft Save As XPS add-in. \n\nDisable PDF: Hides and disables the Microsoft Save As PDF add-in. \n\nDisable XPS and PDF: Hides and disables both the Microsoft Save As PDF and Save As XPS add-ins.","supportedPlatforms":["Windows"],"tags":["Microsoft Save As PDF and XPS add-ins","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_StopReportingErrorMessages","uniqueId":2485,"displayName":"Stop reporting error messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the application reports error messages.\n\nIf you enable this policy, error messages will not be reported.\n\nIf you disable or do not configure this policy setting, error messages will be reported.","supportedPlatforms":["Windows"],"tags":["Improved Error Reporting","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\alerts","registrySubPath":"noalertreporting","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_StopReportingNonCriticalErrors","uniqueId":2484,"displayName":"Stop reporting non-critical errors","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the application reports non-critical errors.\n\nIf you enable this policy, non-critical errors will not be reported.\n\nIf you disable or do not configure this policy setting, non-critical errors will be reported.","supportedPlatforms":["Windows"],"tags":["Improved Error Reporting","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\shipasserts","registrySubPath":"disableshipasserts","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Stream_Video_Preview_and_Playback","uniqueId":5380,"displayName":"Preview and playback a Stream video from within supported Microsoft 365 applications","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls the ability to preview and playback Stream videos in Microsoft 365 applications including in Outlook, the Loop application, and where users can experience Loop components such as within an Outlook email or Teams chat or channel message.\n\nIf you enable or do not configure this policy setting, users will be able to preview and playback Stream videos within supported Microsoft 365 applications.\n\nIf you disable this policy setting, users will not be able to preview and playback Stream videos within supported Microsoft 365 applications, however, users will be able to open Stream video links in the Stream Web Application.\n\nNote: This policy setting only applies to Outlook, Loop applications, and where users can experience Loop components such as within an Outlook email or Teams chat or channel message.","supportedPlatforms":["Windows","iOS","Android","Web"],"tags":["Stream Video Preview and Playback","PreviewAndPlaybackLoop","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\stream","registrySubPath":"StreamVideoPreviewPlayback","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Suggestfrommaindictionaryonly","uniqueId":1685,"displayName":"Suggest from main dictionary only","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Allows users to select words from main lexicon only.","supportedPlatforms":["Windows"],"tags":["Tools | Options | Spelling","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\shared tools\\proofing tools\\1.0\\office","registrySubPath":"suggestfrommainlexonly","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Suppresshyperlinkwarnings","uniqueId":2014,"displayName":"Suppress hyperlink warnings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Office 2016 applications notify users about unsafe hyperlinks.  Links that Office 2016 considers unsafe include links to executable files, TIFF files, and Microsoft Document Imaging (MDI) files. Other unsafe links are those that use protocols considered to be unsafe such as javascript. \n\nIf you enable this policy setting, unsafe hyperlink warnings are suppressed for all users. \n\nIf you disable or do not configure this policy setting, hyperlink warnings cannot be suppressed by any means. Office 2016 users will be notified that links are unsafe and must enable them manually to use them.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security","registrySubPath":"disablehyperlinkwarning","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SuppressNoCertDialog","uniqueId":1713,"displayName":"Display alternative certificate providers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to configure whether Office displays a link to get a certificate from a Microsoft partner when there are no usable signing certificates.\n\nIf you enable this policy setting, the link won’t be displayed.\n\nIf you disable or don’t configure this policy setting, the link is displayed.","supportedPlatforms":["Windows"],"tags":["Digital Signatures","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"suppressnocertdialog","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SuppressRecommendedSettingsDialog","uniqueId":2604,"displayName":"Suppress recommended settings dialog","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls the Recommended Settings dialog on first run of Office.\n\nIf you enable this policy setting, the recommended settings dialog will not be displayed on first run of Office.\n\nIf you disable or do not configure this policy setting, the recommended settings will provide choices to the user to opt into services such as such as Microsoft Update, new software notifications, Customer Experience Improvement Program, Office Diagnostics (Automatically receive small updates to improve reliability) Online Help (Online content options) and Online Search Relevancy that will help improve their Office experience.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"optindisable","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Supressexternalsigningservicesmenuitems","uniqueId":2508,"displayName":"Suppress external signature services menu item","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook displays the \"Add Signature Services\" menu item. \n\nIf you enable this policy setting, Outlook does not display the \"Add Signature Services\" menu item on the Signature Line drop-down menu. \n\nIf you disable or do not configure this policy setting, users can select \"Add Signature Services\" (from the Signature Line drop-down menu on the Insert tab of the Ribbon in Excel, PowerPoint, and Word) to see a list of signature service providers on Office.com.","supportedPlatforms":["Windows"],"tags":["Signing","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"suppressextsigningsvcs","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SupressOfficesigningProviders;L_empty413","uniqueId":2506,"displayName":"Suppress Office Signing Providers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable Western and East Asian","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Suppress default Western","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Suppress default East Asian","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Suppress both Western and East Asian","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls whether users can apply a default Microsoft Office signature line to Word documents and Excel workbooks. Digital signatures provide assurances of authenticity, integrity, and non-repudiation to electronic documents. In Excel and Word, users can add visible representations of their signatures to a document at the same time that they add digital signatures. The ability to capture digital signatures by using signature lines in Office 2016 documents makes it possible for organizations to use paperless signing processes for documents such as contracts or other agreements. \n\nIf you enable this policy setting, you can choose from four options for enabling the default Microsoft Office 2016 signature lines: \n\n- Enable Western and East Asian - Both Microsoft Office Signature Line and Stamp Signature Line are available from the Signature Line drop-down menu on the Insert tab of the Ribbon. \n\n- Suppress default Western -  Users cannot add the Microsoft Office Signature Line to documents. \n\n- Suppress default East Asian - Users cannot add the Stamp Signature Line to documents. \n\n- Suppress both Western and East Asian. Neither of the default signature lines is available. This only takes affect if there is at least one other valid third party signature provider installed. \n\nIf you disable or do not configure this policy setting, Excel and Word include support for two kinds of signature lines, called Microsoft Office Signature Line and Stamp Signature Lines. The choice(s) available to the user vary according to the editing language(s) that are configured for the application at installation. \n\n- Microsoft Office Signature Line displays the letter \"X\" followed by a horizontal line, a familiar convention for handwritten signature lines. \n\n- Stamp Signature Line is only available to users of the Simplified Chinese, Traditional Chinese, Japanese, or Korean language versions of Office 2016, or to users who have installed Office 2016 Multi-Language Pack for one of these languages. This signature line displays a square, a convention in countries where rubber identity stamps (called hanko in Japan and South Korea) are used to sign documents. \n\nBoth kinds of signature lines allow signers to specify their name, title, and e-mail address. If neither kind of signature line is appropriate, third-party signature products can be added to Office applications to serve different needs. \n\nIf the correct signature line is not available for users to choose, they might be prevented from digitally signing documents. \n\nNote -  This policy setting only applies to visible signature lines in Excel workbooks and Word documents. It does not affect the ability of users to add invisible digital signatures to Excel workbooks, PowerPoint presentations, and Word documents.","supportedPlatforms":["Windows"],"tags":["Signing","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\signatures","registrySubPath":"suppressofficedefaultprovider","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SupressOfficesigningProviders","uniqueId":2507,"displayName":"Suppress Office Signing Providers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_SupressOfficesigningProviders;L_empty413","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls whether users can apply a default Microsoft Office signature line to Word documents and Excel workbooks. Digital signatures provide assurances of authenticity, integrity, and non-repudiation to electronic documents. In Excel and Word, users can add visible representations of their signatures to a document at the same time that they add digital signatures. The ability to capture digital signatures by using signature lines in Office 2016 documents makes it possible for organizations to use paperless signing processes for documents such as contracts or other agreements. \n\nIf you enable this policy setting, you can choose from four options for enabling the default Microsoft Office 2016 signature lines: \n\n- Enable Western and East Asian - Both Microsoft Office Signature Line and Stamp Signature Line are available from the Signature Line drop-down menu on the Insert tab of the Ribbon. \n\n- Suppress default Western -  Users cannot add the Microsoft Office Signature Line to documents. \n\n- Suppress default East Asian - Users cannot add the Stamp Signature Line to documents. \n\n- Suppress both Western and East Asian. Neither of the default signature lines is available. This only takes affect if there is at least one other valid third party signature provider installed. \n\nIf you disable or do not configure this policy setting, Excel and Word include support for two kinds of signature lines, called Microsoft Office Signature Line and Stamp Signature Lines. The choice(s) available to the user vary according to the editing language(s) that are configured for the application at installation. \n\n- Microsoft Office Signature Line displays the letter \"X\" followed by a horizontal line, a familiar convention for handwritten signature lines. \n\n- Stamp Signature Line is only available to users of the Simplified Chinese, Traditional Chinese, Japanese, or Korean language versions of Office 2016, or to users who have installed Office 2016 Multi-Language Pack for one of these languages. This signature line displays a square, a convention in countries where rubber identity stamps (called hanko in Japan and South Korea) are used to sign documents. \n\nBoth kinds of signature lines allow signers to specify their name, title, and e-mail address. If neither kind of signature line is appropriate, third-party signature products can be added to Office applications to serve different needs. \n\nIf the correct signature line is not available for users to choose, they might be prevented from digitally signing documents. \n\nNote -  This policy setting only applies to visible signature lines in Excel workbooks and Word documents. It does not affect the ability of users to add invisible digital signatures to Excel workbooks, PowerPoint presentations, and Word documents.","supportedPlatforms":["Windows"],"tags":["Signing","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Swahili","uniqueId":2264,"displayName":"Swahili","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Swahili","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sw-ke","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SwedishFinland","uniqueId":2265,"displayName":"Swedish (Finland)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Swedish (Finland)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sv-fi","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_SwedishSweden","uniqueId":2266,"displayName":"Swedish (Sweden)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Swedish (Sweden)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"sv-se","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Syriac","uniqueId":2267,"displayName":"Syriac","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Syriac","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"syr-sy","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Tajik","uniqueId":2273,"displayName":"Tajik","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Tajik","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"tg-cyrl-tj","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TamazightArabicMorocco","uniqueId":2269,"displayName":"Central Atlas Tamazight (Arabic, Morocco)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Central Atlas Tamazight (Arabic, Morocco)\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"tzm-arab-ma","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TamazightLatinAlgeria","uniqueId":2268,"displayName":"Central Atlas Tamazight (Latin, Algeria)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language \"Central Atlas Tamazight (Latin, Algeria)\"","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"tzm-latn-dz","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Tamil","uniqueId":2270,"displayName":"Tamil","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Tamil","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ta-in","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Targetmonitor;L_Pixelsperinch","uniqueId":1667,"displayName":"Pixels per inch","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":72,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"72","description":"","tags":[],"dependencyGroup":null},{"value":96,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"96","description":"","tags":[],"dependencyGroup":null},{"value":120,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"120","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":72,"description":"Sets the value in the UI.","supportedPlatforms":["Windows"],"tags":["Browsers","Tools | Options | General | Web Options...","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"pixelsperinch","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Targetmonitor;L_Screensize","uniqueId":1666,"displayName":"Screen size","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"544x376","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"544 x 376","description":"","tags":[],"dependencyGroup":null},{"value":"640x480","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"640 x 480","description":"","tags":[],"dependencyGroup":null},{"value":"720x512","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"720 x 512","description":"","tags":[],"dependencyGroup":null},{"value":"800x600","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"800 x 600","description":"","tags":[],"dependencyGroup":null},{"value":"1024x768","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1024 x 768","description":"","tags":[],"dependencyGroup":null},{"value":"1152x882","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1152 x 882","description":"","tags":[],"dependencyGroup":null},{"value":"1152x900","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1152 x 900","description":"","tags":[],"dependencyGroup":null},{"value":"1280x1024","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1280 x 1024","description":"","tags":[],"dependencyGroup":null},{"value":"1600x1200","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1600 x 1200","description":"","tags":[],"dependencyGroup":null},{"value":"1800x1440","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1800 x 1440","description":"","tags":[],"dependencyGroup":null},{"value":"1920x1200","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1920 x 1200","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"544x376","description":"Sets the value in the UI.","supportedPlatforms":["Windows"],"tags":["Browsers","Tools | Options | General | Web Options...","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"screensize","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_Targetmonitor","uniqueId":1668,"displayName":"Target monitor","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Targetmonitor;L_Screensize","logicalOperator":"exists","values":null},{"dependee":"office16;L_Targetmonitor;L_Pixelsperinch","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value in the UI.","supportedPlatforms":["Windows"],"tags":["Browsers","Tools | Options | General | Web Options...","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Tatar","uniqueId":2271,"displayName":"Tatar","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Tatar","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"tt-ru","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Telugu","uniqueId":2272,"displayName":"Telugu","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Telugu","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"te-in","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TestSendFeedback","uniqueId":5382,"displayName":"THIS IS A TEST POLICY","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Test A","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Test B","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Test C","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"THIS IS A TEST POLICY","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["TestPolicy","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\test","registrySubPath":"test","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Thai","uniqueId":2274,"displayName":"Thai","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Thai","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"th-th","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_ThirdPartyStorageAllowList","uniqueId":5383,"displayName":"Filter visible third‑party storage providers (Add-A-Place/Add-Storage-Account)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_ThirdPartyStorageAllowList;L_ThirdPartyStorageAllowList","logicalOperator":"exists","values":[]}],"logicalOperator":1}}]},"dataType":"Composite"},"description":"This policy setting allows you to provide a list of one or more third-party storage service IDs, separated by semicolons (e.g., TP_SERVICE_1;TP_SERVICE_2). Only providers listed here will appear when users add a storage account in Office.\n\nIf you enable this policy setting, only the third‑party storage providers you specify in the list will appear when users add a storage account in Office; all other third-party storage providers will be hidden. If the list contains only invalid or unrecognized service IDs, then all third‑party storage account options will be hidden.\n\nIf you disable or don't configure this policy setting, all third‑party storage providers available to the user will be visible in Office and no filtering or allow‑list rules will be applied.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["ThirdPartyStorageAllowList","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_ThirdPartyStorageAllowList;L_ThirdPartyStorageAllowList","uniqueId":5384,"displayName":"List of storage providers:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to provide a list of one or more third-party storage service IDs, separated by semicolons (e.g., TP_SERVICE_1;TP_SERVICE_2). Only providers listed here will appear when users add a storage account in Office.\n\nIf you enable this policy setting, only the third‑party storage providers you specify in the list will appear when users add a storage account in Office; all other third-party storage providers will be hidden. If the list contains only invalid or unrecognized service IDs, then all third‑party storage account options will be hidden.\n\nIf you disable or don't configure this policy setting, all third‑party storage providers available to the user will be visible in Office and no filtering or allow‑list rules will be applied.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["ThirdPartyStorageAllowList","Cloud Policies Composite","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\storageproviderfilters","registrySubPath":"ThirdPartyStorageAllowList","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TibetanPRC","uniqueId":2275,"displayName":"Tibetan (China)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Tibetan (China)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"bo-cn","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TigrinyaEritrea","uniqueId":2276,"displayName":"Tigrinya (Eritrea)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Tigrinya (Eritrea)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ti-er","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TigrinyaEthiopia","uniqueId":2277,"displayName":"Tigrinya (Ethiopia)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Tigrinya (Ethiopia)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ti-et","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Tooltipfordisabledtoolbarbuttonsandmenuitems","uniqueId":2306,"displayName":"Tooltip for disabled toolbar buttons and menu items","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Tooltipfordisabledtoolbarbuttonsandmenuitems;L_tooltipfordisabledtoolbarbuttonsandmenuitems353","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines the text to be used in tooltips for disabled toolbar buttons and menu items.","supportedPlatforms":["Windows"],"tags":["Disable Items in User Interface","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Tooltipfordisabledtoolbarbuttonsandmenuitems;L_tooltipfordisabledtoolbarbuttonsandmenuitems353","uniqueId":2305,"displayName":"Tooltip for disabled toolbar buttons and menu items","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Defines the text to be used in tooltips for disabled toolbar buttons and menu items.","supportedPlatforms":["Windows"],"tags":["Disable Items in User Interface","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars","registrySubPath":"attemptdisabledactionmessage","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustCenterSolution;L_empty421","uniqueId":2531,"displayName":"Trust Local Solution","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"Suppresses prompt that asks to load a locally installed full-trust solution of a Document Information Panel in the background. This is normally shown if a full-trust solution is deployed and there are bound properties in the document (e.g. lookups) that must load the Document Information Panel in the background to retrieve the contents of the property. \n\nEnter pairs corresponding to the Document Information Panel solution path and a value of 1 to disable. If the value is set, the user will not be prompted when loading the full-trust solution in the background. The solution will load normally (and any non-related warnings that exist).","supportedPlatforms":["Windows"],"tags":["Document Information Panel","Microsoft Office 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\documentinformationpanel\\trustsolution","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustCenterSolution","uniqueId":2532,"displayName":"Trust Local Solution","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustCenterSolution;L_empty421","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Suppresses prompt that asks to load a locally installed full-trust solution of a Document Information Panel in the background. This is normally shown if a full-trust solution is deployed and there are bound properties in the document (e.g. lookups) that must load the Document Information Panel in the background to retrieve the contents of the property. \n\nEnter pairs corresponding to the Document Information Panel solution path and a value of 1 to disable. If the value is set, the user will not be prompted when loading the full-trust solution in the background. The solution will load normally (and any non-related warnings that exist).","supportedPlatforms":["Windows"],"tags":["Document Information Panel","Microsoft Office 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustedCatalog01","uniqueId":1838,"displayName":"Trusted Catalog Location #1","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedCatalog01;L_URL","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting sets the URL location of a Trusted SharePoint Catalog or Shared Folder Catalog. All web add-ins at this location are trusted so that users can work with these add-ins in their documents. However, the user cannot insert these add-ins into an Office document.\n\nIf you enable this policy setting and set the URL, users can work with web add-ins from the SharePoint Catalog or Shared Folder Catalog at that URL. Shared Folder Catalogs at that URL will be ignored if the policy to allow users to control the Trusted Shared Folder Catalogs is enabled.\n\nIf you disable this policy setting, users will not be able to work with any web add-ins on Internet zone catalogs, and they will be prompted before they start web add-ins from any other catalogs. If the policy to allow users to control the Trusted Shared Folder Catalogs is enabled, users can set their own Trusted Shared Folder Catalog locations and web add-ins in the their Trusted Catalogs locations will be started without a trust prompt.\n\nIf you do not configure this policy setting or any other policy settings in the Trusted Catalogs folder, users can set their own Trusted Sharepoint Catalog and Shared Folder Catalog locations","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog01","registrySubPath":"id","enforcedValues":{"enabled":"catalog01"}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog01","registrySubPath":"flags","enforcedValues":{"enabled":0}}]}}},{"id":"office16;L_TrustedCatalog01;L_URL","uniqueId":1837,"displayName":"URL: ","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting sets the URL location of a Trusted SharePoint Catalog or Shared Folder Catalog. All web add-ins at this location are trusted so that users can work with these add-ins in their documents. However, the user cannot insert these add-ins into an Office document.\n\nIf you enable this policy setting and set the URL, users can work with web add-ins from the SharePoint Catalog or Shared Folder Catalog at that URL. Shared Folder Catalogs at that URL will be ignored if the policy to allow users to control the Trusted Shared Folder Catalogs is enabled.\n\nIf you disable this policy setting, users will not be able to work with any web add-ins on Internet zone catalogs, and they will be prompted before they start web add-ins from any other catalogs. If the policy to allow users to control the Trusted Shared Folder Catalogs is enabled, users can set their own Trusted Shared Folder Catalog locations and web add-ins in the their Trusted Catalogs locations will be started without a trust prompt.\n\nIf you do not configure this policy setting or any other policy settings in the Trusted Catalogs folder, users can set their own Trusted Sharepoint Catalog and Shared Folder Catalog locations","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog01","registrySubPath":"url","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedCatalog02","uniqueId":1840,"displayName":"Trusted Catalog Location #2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedCatalog02;L_URL","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting sets the URL location of a Trusted SharePoint Catalog or Shared Folder Catalog. All web add-ins at this location are trusted so that users can work with these add-ins in their documents. However, the user cannot insert these add-ins into an Office document.\n\nIf you enable this policy setting and set the URL, users can work with web add-ins from the SharePoint Catalog or Shared Folder Catalog at that URL. Shared Folder Catalogs at that URL will be ignored if the policy to allow users to control the Trusted Shared Folder Catalogs is enabled.\n\nIf you disable this policy setting, users will not be able to work with any web add-ins on Internet zone catalogs, and they will be prompted before they start web add-ins from any other catalogs. If the policy to allow users to control the Trusted Shared Folder Catalogs is enabled, users can set their own Trusted Shared Folder Catalog locations and web add-ins in the their Trusted Catalogs locations will be started without a trust prompt.\n\nIf you do not configure this policy setting or any other policy settings in the Trusted Catalogs folder, users can set their own Trusted Sharepoint Catalog and Shared Folder Catalog locations","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog02","registrySubPath":"id","enforcedValues":{"enabled":"catalog02"}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog02","registrySubPath":"flags","enforcedValues":{"enabled":0}}]}}},{"id":"office16;L_TrustedCatalog02;L_URL","uniqueId":1839,"displayName":"URL: ","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting sets the URL location of a Trusted SharePoint Catalog or Shared Folder Catalog. All web add-ins at this location are trusted so that users can work with these add-ins in their documents. However, the user cannot insert these add-ins into an Office document.\n\nIf you enable this policy setting and set the URL, users can work with web add-ins from the SharePoint Catalog or Shared Folder Catalog at that URL. Shared Folder Catalogs at that URL will be ignored if the policy to allow users to control the Trusted Shared Folder Catalogs is enabled.\n\nIf you disable this policy setting, users will not be able to work with any web add-ins on Internet zone catalogs, and they will be prompted before they start web add-ins from any other catalogs. If the policy to allow users to control the Trusted Shared Folder Catalogs is enabled, users can set their own Trusted Shared Folder Catalog locations and web add-ins in the their Trusted Catalogs locations will be started without a trust prompt.\n\nIf you do not configure this policy setting or any other policy settings in the Trusted Catalogs folder, users can set their own Trusted Sharepoint Catalog and Shared Folder Catalog locations","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog02","registrySubPath":"url","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedCatalog03","uniqueId":1842,"displayName":"Trusted Catalog Location #3","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedCatalog03;L_URL","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting sets the URL location of a Trusted SharePoint Catalog or Shared Folder Catalog. All web add-ins at this location are trusted so that users can work with these add-ins in their documents. However, the user cannot insert these add-ins into an Office document.\n\nIf you enable this policy setting and set the URL, users can work with web add-ins from the SharePoint Catalog or Shared Folder Catalog at that URL. Shared Folder Catalogs at that URL will be ignored if the policy to allow users to control the Trusted Shared Folder Catalogs is enabled.\n\nIf you disable this policy setting, users will not be able to work with any web add-ins on Internet zone catalogs, and they will be prompted before they start web add-ins from any other catalogs. If the policy to allow users to control the Trusted Shared Folder Catalogs is enabled, users can set their own Trusted Shared Folder Catalog locations and web add-ins in the their Trusted Catalogs locations will be started without a trust prompt.\n\nIf you do not configure this policy setting or any other policy settings in the Trusted Catalogs folder, users can set their own Trusted Sharepoint Catalog and Shared Folder Catalog locations","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog03","registrySubPath":"id","enforcedValues":{"enabled":"catalog03"}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog03","registrySubPath":"flags","enforcedValues":{"enabled":0}}]}}},{"id":"office16;L_TrustedCatalog03;L_URL","uniqueId":1841,"displayName":"URL: ","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting sets the URL location of a Trusted SharePoint Catalog or Shared Folder Catalog. All web add-ins at this location are trusted so that users can work with these add-ins in their documents. However, the user cannot insert these add-ins into an Office document.\n\nIf you enable this policy setting and set the URL, users can work with web add-ins from the SharePoint Catalog or Shared Folder Catalog at that URL. Shared Folder Catalogs at that URL will be ignored if the policy to allow users to control the Trusted Shared Folder Catalogs is enabled.\n\nIf you disable this policy setting, users will not be able to work with any web add-ins on Internet zone catalogs, and they will be prompted before they start web add-ins from any other catalogs. If the policy to allow users to control the Trusted Shared Folder Catalogs is enabled, users can set their own Trusted Shared Folder Catalog locations and web add-ins in the their Trusted Catalogs locations will be started without a trust prompt.\n\nIf you do not configure this policy setting or any other policy settings in the Trusted Catalogs folder, users can set their own Trusted Sharepoint Catalog and Shared Folder Catalog locations","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog03","registrySubPath":"url","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedCatalog04","uniqueId":1844,"displayName":"Trusted Catalog Location #4","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedCatalog04;L_URL","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting sets the URL location of a Trusted SharePoint Catalog or Shared Folder Catalog. All web add-ins at this location are trusted so that users can work with these add-ins in their documents. However, the user cannot insert these add-ins into an Office document.\n\nIf you enable this policy setting and set the URL, users can work with web add-ins from the SharePoint Catalog or Shared Folder Catalog at that URL. Shared Folder Catalogs at that URL will be ignored if the policy to allow users to control the Trusted Shared Folder Catalogs is enabled.\n\nIf you disable this policy setting, users will not be able to work with any web add-ins on Internet zone catalogs, and they will be prompted before they start web add-ins from any other catalogs. If the policy to allow users to control the Trusted Shared Folder Catalogs is enabled, users can set their own Trusted Shared Folder Catalog locations and web add-ins in the their Trusted Catalogs locations will be started without a trust prompt.\n\nIf you do not configure this policy setting or any other policy settings in the Trusted Catalogs folder, users can set their own Trusted Sharepoint Catalog and Shared Folder Catalog locations","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog04","registrySubPath":"id","enforcedValues":{"enabled":"catalog04"}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog04","registrySubPath":"flags","enforcedValues":{"enabled":0}}]}}},{"id":"office16;L_TrustedCatalog04;L_URL","uniqueId":1843,"displayName":"URL: ","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting sets the URL location of a Trusted SharePoint Catalog or Shared Folder Catalog. All web add-ins at this location are trusted so that users can work with these add-ins in their documents. However, the user cannot insert these add-ins into an Office document.\n\nIf you enable this policy setting and set the URL, users can work with web add-ins from the SharePoint Catalog or Shared Folder Catalog at that URL. Shared Folder Catalogs at that URL will be ignored if the policy to allow users to control the Trusted Shared Folder Catalogs is enabled.\n\nIf you disable this policy setting, users will not be able to work with any web add-ins on Internet zone catalogs, and they will be prompted before they start web add-ins from any other catalogs. If the policy to allow users to control the Trusted Shared Folder Catalogs is enabled, users can set their own Trusted Shared Folder Catalog locations and web add-ins in the their Trusted Catalogs locations will be started without a trust prompt.\n\nIf you do not configure this policy setting or any other policy settings in the Trusted Catalogs folder, users can set their own Trusted Sharepoint Catalog and Shared Folder Catalog locations","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog04","registrySubPath":"url","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedCatalog05","uniqueId":1846,"displayName":"Trusted Catalog Location #5","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedCatalog05;L_URL","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting sets the URL location of a Trusted SharePoint Catalog or Shared Folder Catalog. All web add-ins at this location are trusted so that users can work with these add-ins in their documents. However, the user cannot insert these add-ins into an Office document.\n\nIf you enable this policy setting and set the URL, users can work with web add-ins from the SharePoint Catalog or Shared Folder Catalog at that URL. Shared Folder Catalogs at that URL will be ignored if the policy to allow users to control the Trusted Shared Folder Catalogs is enabled.\n\nIf you disable this policy setting, users will not be able to work with any web add-ins on Internet zone catalogs, and they will be prompted before they start web add-ins from any other catalogs. If the policy to allow users to control the Trusted Shared Folder Catalogs is enabled, users can set their own Trusted Shared Folder Catalog locations and web add-ins in the their Trusted Catalogs locations will be started without a trust prompt.\n\nIf you do not configure this policy setting or any other policy settings in the Trusted Catalogs folder, users can set their own Trusted Sharepoint Catalog and Shared Folder Catalog locations","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog05","registrySubPath":"id","enforcedValues":{"enabled":"catalog05"}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog05","registrySubPath":"flags","enforcedValues":{"enabled":0}}]}}},{"id":"office16;L_TrustedCatalog05;L_URL","uniqueId":1845,"displayName":"URL: ","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting sets the URL location of a Trusted SharePoint Catalog or Shared Folder Catalog. All web add-ins at this location are trusted so that users can work with these add-ins in their documents. However, the user cannot insert these add-ins into an Office document.\n\nIf you enable this policy setting and set the URL, users can work with web add-ins from the SharePoint Catalog or Shared Folder Catalog at that URL. Shared Folder Catalogs at that URL will be ignored if the policy to allow users to control the Trusted Shared Folder Catalogs is enabled.\n\nIf you disable this policy setting, users will not be able to work with any web add-ins on Internet zone catalogs, and they will be prompted before they start web add-ins from any other catalogs. If the policy to allow users to control the Trusted Shared Folder Catalogs is enabled, users can set their own Trusted Shared Folder Catalog locations and web add-ins in the their Trusted Catalogs locations will be started without a trust prompt.\n\nIf you do not configure this policy setting or any other policy settings in the Trusted Catalogs folder, users can set their own Trusted Sharepoint Catalog and Shared Folder Catalog locations","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog05","registrySubPath":"url","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedCatalog06","uniqueId":1848,"displayName":"Trusted Catalog Location #6","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedCatalog06;L_URL","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting sets the URL location of a Trusted SharePoint Catalog or Shared Folder Catalog. All web add-ins at this location are trusted so that users can work with these add-ins in their documents. However, the user cannot insert these add-ins into an Office document.\n\nIf you enable this policy setting and set the URL, users can work with web add-ins from the SharePoint Catalog or Shared Folder Catalog at that URL. Shared Folder Catalogs at that URL will be ignored if the policy to allow users to control the Trusted Shared Folder Catalogs is enabled.\n\nIf you disable this policy setting, users will not be able to work with any web add-ins on Internet zone catalogs, and they will be prompted before they start web add-ins from any other catalogs. If the policy to allow users to control the Trusted Shared Folder Catalogs is enabled, users can set their own Trusted Shared Folder Catalog locations and web add-ins in the their Trusted Catalogs locations will be started without a trust prompt.\n\nIf you do not configure this policy setting or any other policy settings in the Trusted Catalogs folder, users can set their own Trusted Sharepoint Catalog and Shared Folder Catalog locations","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog06","registrySubPath":"id","enforcedValues":{"enabled":"catalog06"}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog06","registrySubPath":"flags","enforcedValues":{"enabled":0}}]}}},{"id":"office16;L_TrustedCatalog06;L_URL","uniqueId":1847,"displayName":"URL: ","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting sets the URL location of a Trusted SharePoint Catalog or Shared Folder Catalog. All web add-ins at this location are trusted so that users can work with these add-ins in their documents. However, the user cannot insert these add-ins into an Office document.\n\nIf you enable this policy setting and set the URL, users can work with web add-ins from the SharePoint Catalog or Shared Folder Catalog at that URL. Shared Folder Catalogs at that URL will be ignored if the policy to allow users to control the Trusted Shared Folder Catalogs is enabled.\n\nIf you disable this policy setting, users will not be able to work with any web add-ins on Internet zone catalogs, and they will be prompted before they start web add-ins from any other catalogs. If the policy to allow users to control the Trusted Shared Folder Catalogs is enabled, users can set their own Trusted Shared Folder Catalog locations and web add-ins in the their Trusted Catalogs locations will be started without a trust prompt.\n\nIf you do not configure this policy setting or any other policy settings in the Trusted Catalogs folder, users can set their own Trusted Sharepoint Catalog and Shared Folder Catalog locations","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog06","registrySubPath":"url","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedCatalog07","uniqueId":1850,"displayName":"Trusted Catalog Location #7","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedCatalog07;L_URL","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting sets the URL location of a Trusted SharePoint Catalog or Shared Folder Catalog. All web add-ins at this location are trusted so that users can work with these add-ins in their documents. However, the user cannot insert these add-ins into an Office document.\n\nIf you enable this policy setting and set the URL, users can work with web add-ins from the SharePoint Catalog or Shared Folder Catalog at that URL. Shared Folder Catalogs at that URL will be ignored if the policy to allow users to control the Trusted Shared Folder Catalogs is enabled.\n\nIf you disable this policy setting, users will not be able to work with any web add-ins on Internet zone catalogs, and they will be prompted before they start web add-ins from any other catalogs. If the policy to allow users to control the Trusted Shared Folder Catalogs is enabled, users can set their own Trusted Shared Folder Catalog locations and web add-ins in the their Trusted Catalogs locations will be started without a trust prompt.\n\nIf you do not configure this policy setting or any other policy settings in the Trusted Catalogs folder, users can set their own Trusted Sharepoint Catalog and Shared Folder Catalog locations","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog07","registrySubPath":"id","enforcedValues":{"enabled":"catalog07"}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog07","registrySubPath":"flags","enforcedValues":{"enabled":0}}]}}},{"id":"office16;L_TrustedCatalog07;L_URL","uniqueId":1849,"displayName":"URL: ","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting sets the URL location of a Trusted SharePoint Catalog or Shared Folder Catalog. All web add-ins at this location are trusted so that users can work with these add-ins in their documents. However, the user cannot insert these add-ins into an Office document.\n\nIf you enable this policy setting and set the URL, users can work with web add-ins from the SharePoint Catalog or Shared Folder Catalog at that URL. Shared Folder Catalogs at that URL will be ignored if the policy to allow users to control the Trusted Shared Folder Catalogs is enabled.\n\nIf you disable this policy setting, users will not be able to work with any web add-ins on Internet zone catalogs, and they will be prompted before they start web add-ins from any other catalogs. If the policy to allow users to control the Trusted Shared Folder Catalogs is enabled, users can set their own Trusted Shared Folder Catalog locations and web add-ins in the their Trusted Catalogs locations will be started without a trust prompt.\n\nIf you do not configure this policy setting or any other policy settings in the Trusted Catalogs folder, users can set their own Trusted Sharepoint Catalog and Shared Folder Catalog locations","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog07","registrySubPath":"url","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedCatalog08","uniqueId":1852,"displayName":"Trusted Catalog Location #8","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedCatalog08;L_URL","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting sets the URL location of a Trusted SharePoint Catalog or Shared Folder Catalog. All web add-ins at this location are trusted so that users can work with these add-ins in their documents. However, the user cannot insert these add-ins into an Office document.\n\nIf you enable this policy setting and set the URL, users can work with web add-ins from the SharePoint Catalog or Shared Folder Catalog at that URL. Shared Folder Catalogs at that URL will be ignored if the policy to allow users to control the Trusted Shared Folder Catalogs is enabled.\n\nIf you disable this policy setting, users will not be able to work with any web add-ins on Internet zone catalogs, and they will be prompted before they start web add-ins from any other catalogs. If the policy to allow users to control the Trusted Shared Folder Catalogs is enabled, users can set their own Trusted Shared Folder Catalog locations and web add-ins in the their Trusted Catalogs locations will be started without a trust prompt.\n\nIf you do not configure this policy setting or any other policy settings in the Trusted Catalogs folder, users can set their own Trusted Sharepoint Catalog and Shared Folder Catalog locations","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog08","registrySubPath":"id","enforcedValues":{"enabled":"catalog08"}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog08","registrySubPath":"flags","enforcedValues":{"enabled":0}}]}}},{"id":"office16;L_TrustedCatalog08;L_URL","uniqueId":1851,"displayName":"URL: ","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting sets the URL location of a Trusted SharePoint Catalog or Shared Folder Catalog. All web add-ins at this location are trusted so that users can work with these add-ins in their documents. However, the user cannot insert these add-ins into an Office document.\n\nIf you enable this policy setting and set the URL, users can work with web add-ins from the SharePoint Catalog or Shared Folder Catalog at that URL. Shared Folder Catalogs at that URL will be ignored if the policy to allow users to control the Trusted Shared Folder Catalogs is enabled.\n\nIf you disable this policy setting, users will not be able to work with any web add-ins on Internet zone catalogs, and they will be prompted before they start web add-ins from any other catalogs. If the policy to allow users to control the Trusted Shared Folder Catalogs is enabled, users can set their own Trusted Shared Folder Catalog locations and web add-ins in the their Trusted Catalogs locations will be started without a trust prompt.\n\nIf you do not configure this policy setting or any other policy settings in the Trusted Catalogs folder, users can set their own Trusted Sharepoint Catalog and Shared Folder Catalog locations","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog08","registrySubPath":"url","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedCatalog09","uniqueId":1854,"displayName":"Trusted Catalog Location #9","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedCatalog09;L_URL","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting sets the URL location of a Trusted SharePoint Catalog or Shared Folder Catalog. All web add-ins at this location are trusted so that users can work with these add-ins in their documents. However, the user cannot insert these add-ins into an Office document.\n\nIf you enable this policy setting and set the URL, users can work with web add-ins from the SharePoint Catalog or Shared Folder Catalog at that URL. Shared Folder Catalogs at that URL will be ignored if the policy to allow users to control the Trusted Shared Folder Catalogs is enabled.\n\nIf you disable this policy setting, users will not be able to work with any web add-ins on Internet zone catalogs, and they will be prompted before they start web add-ins from any other catalogs. If the policy to allow users to control the Trusted Shared Folder Catalogs is enabled, users can set their own Trusted Shared Folder Catalog locations and web add-ins in the their Trusted Catalogs locations will be started without a trust prompt.\n\nIf you do not configure this policy setting or any other policy settings in the Trusted Catalogs folder, users can set their own Trusted Sharepoint Catalog and Shared Folder Catalog locations","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog09","registrySubPath":"id","enforcedValues":{"enabled":"catalog09"}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog09","registrySubPath":"flags","enforcedValues":{"enabled":0}}]}}},{"id":"office16;L_TrustedCatalog09;L_URL","uniqueId":1853,"displayName":"URL: ","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting sets the URL location of a Trusted SharePoint Catalog or Shared Folder Catalog. All web add-ins at this location are trusted so that users can work with these add-ins in their documents. However, the user cannot insert these add-ins into an Office document.\n\nIf you enable this policy setting and set the URL, users can work with web add-ins from the SharePoint Catalog or Shared Folder Catalog at that URL. Shared Folder Catalogs at that URL will be ignored if the policy to allow users to control the Trusted Shared Folder Catalogs is enabled.\n\nIf you disable this policy setting, users will not be able to work with any web add-ins on Internet zone catalogs, and they will be prompted before they start web add-ins from any other catalogs. If the policy to allow users to control the Trusted Shared Folder Catalogs is enabled, users can set their own Trusted Shared Folder Catalog locations and web add-ins in the their Trusted Catalogs locations will be started without a trust prompt.\n\nIf you do not configure this policy setting or any other policy settings in the Trusted Catalogs folder, users can set their own Trusted Sharepoint Catalog and Shared Folder Catalog locations","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog09","registrySubPath":"url","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedCatalog10","uniqueId":1856,"displayName":"Trusted Catalog Location #10","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedCatalog10;L_URL","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting sets the URL location of a Trusted SharePoint Catalog or Shared Folder Catalog. All web add-ins at this location are trusted so that users can work with these add-ins in their documents. However, the user cannot insert these add-ins into an Office document.\n\nIf you enable this policy setting and set the URL, users can work with web add-ins from the SharePoint Catalog or Shared Folder Catalog at that URL. Shared Folder Catalogs at that URL will be ignored if the policy to allow users to control the Trusted Shared Folder Catalogs is enabled.\n\nIf you disable this policy setting, users will not be able to work with any web add-ins on Internet zone catalogs, and they will be prompted before they start web add-ins from any other catalogs. If the policy to allow users to control the Trusted Shared Folder Catalogs is enabled, users can set their own Trusted Shared Folder Catalog locations and web add-ins in the their Trusted Catalogs locations will be started without a trust prompt.\n\nIf you do not configure this policy setting or any other policy settings in the Trusted Catalogs folder, users can set their own Trusted Sharepoint Catalog and Shared Folder Catalog locations","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog10","registrySubPath":"id","enforcedValues":{"enabled":"catalog10"}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog10","registrySubPath":"flags","enforcedValues":{"enabled":0}}]}}},{"id":"office16;L_TrustedCatalog10;L_URL","uniqueId":1855,"displayName":"URL: ","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting sets the URL location of a Trusted SharePoint Catalog or Shared Folder Catalog. All web add-ins at this location are trusted so that users can work with these add-ins in their documents. However, the user cannot insert these add-ins into an Office document.\n\nIf you enable this policy setting and set the URL, users can work with web add-ins from the SharePoint Catalog or Shared Folder Catalog at that URL. Shared Folder Catalogs at that URL will be ignored if the policy to allow users to control the Trusted Shared Folder Catalogs is enabled.\n\nIf you disable this policy setting, users will not be able to work with any web add-ins on Internet zone catalogs, and they will be prompted before they start web add-ins from any other catalogs. If the policy to allow users to control the Trusted Shared Folder Catalogs is enabled, users can set their own Trusted Shared Folder Catalog locations and web add-ins in the their Trusted Catalogs locations will be started without a trust prompt.\n\nIf you do not configure this policy setting or any other policy settings in the Trusted Catalogs folder, users can set their own Trusted Sharepoint Catalog and Shared Folder Catalog locations","supportedPlatforms":["Windows"],"tags":["Trusted Catalogs","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\trustedcatalogs\\catalog10","registrySubPath":"url","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc01;L_Allowsubfolders","uniqueId":1901,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location1","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc01;L_Datecolon","uniqueId":1899,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location1","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc01;L_Descriptioncolon","uniqueId":1900,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location1","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc01;L_Pathcolon","uniqueId":1898,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location1","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc01","uniqueId":1902,"displayName":"Trusted Location #1","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedLoc01;L_Pathcolon","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc01;L_Datecolon","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc01;L_Descriptioncolon","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc01;L_Allowsubfolders","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustedLoc02;L_allowsubfolders245","uniqueId":1906,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location2","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc02;L_datecolon243","uniqueId":1904,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location2","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc02;L_descriptioncolon244","uniqueId":1905,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location2","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc02;L_pathcolon242","uniqueId":1903,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location2","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc02","uniqueId":1907,"displayName":"Trusted Location #2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedLoc02;L_pathcolon242","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc02;L_datecolon243","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc02;L_descriptioncolon244","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc02;L_allowsubfolders245","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustedLoc03;L_allowsubfolders249","uniqueId":1911,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location3","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc03;L_datecolon247","uniqueId":1909,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location3","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc03;L_descriptioncolon248","uniqueId":1910,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location3","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc03;L_pathcolon246","uniqueId":1908,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location3","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc03","uniqueId":1912,"displayName":"Trusted Location #3","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedLoc03;L_pathcolon246","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc03;L_datecolon247","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc03;L_descriptioncolon248","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc03;L_allowsubfolders249","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustedLoc04;L_allowsubfolders253","uniqueId":1916,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location4","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc04;L_datecolon251","uniqueId":1914,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location4","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc04;L_descriptioncolon252","uniqueId":1915,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location4","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc04;L_pathcolon250","uniqueId":1913,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location4","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc04","uniqueId":1917,"displayName":"Trusted Location #4","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedLoc04;L_pathcolon250","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc04;L_datecolon251","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc04;L_descriptioncolon252","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc04;L_allowsubfolders253","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustedLoc05;L_allowsubfolders257","uniqueId":1921,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location5","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc05;L_datecolon255","uniqueId":1919,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location5","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc05;L_descriptioncolon256","uniqueId":1920,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location5","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc05;L_pathcolon254","uniqueId":1918,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location5","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc05","uniqueId":1922,"displayName":"Trusted Location #5","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedLoc05;L_pathcolon254","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc05;L_datecolon255","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc05;L_descriptioncolon256","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc05;L_allowsubfolders257","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustedLoc06;L_allowsubfolders261","uniqueId":1926,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location6","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc06;L_datecolon259","uniqueId":1924,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location6","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc06;L_descriptioncolon260","uniqueId":1925,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location6","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc06;L_pathcolon258","uniqueId":1923,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location6","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc06","uniqueId":1927,"displayName":"Trusted Location #6","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedLoc06;L_pathcolon258","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc06;L_datecolon259","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc06;L_descriptioncolon260","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc06;L_allowsubfolders261","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustedLoc07;L_allowsubfolders265","uniqueId":1931,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location7","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc07;L_datecolon263","uniqueId":1929,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location7","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc07;L_descriptioncolon264","uniqueId":1930,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location7","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc07;L_pathcolon262","uniqueId":1928,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location7","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc07","uniqueId":1932,"displayName":"Trusted Location #7","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedLoc07;L_pathcolon262","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc07;L_datecolon263","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc07;L_descriptioncolon264","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc07;L_allowsubfolders265","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustedLoc08;L_allowsubfolders269","uniqueId":1936,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location8","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc08;L_datecolon267","uniqueId":1934,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location8","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc08;L_descriptioncolon268","uniqueId":1935,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location8","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc08;L_pathcolon266","uniqueId":1933,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location8","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc08","uniqueId":1937,"displayName":"Trusted Location #8","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedLoc08;L_pathcolon266","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc08;L_datecolon267","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc08;L_descriptioncolon268","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc08;L_allowsubfolders269","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustedLoc09;L_allowsubfolders273","uniqueId":1941,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location9","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc09;L_datecolon271","uniqueId":1939,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location9","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc09;L_descriptioncolon272","uniqueId":1940,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location9","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc09;L_pathcolon270","uniqueId":1938,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location9","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc09","uniqueId":1942,"displayName":"Trusted Location #9","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedLoc09;L_pathcolon270","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc09;L_datecolon271","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc09;L_descriptioncolon272","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc09;L_allowsubfolders273","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustedLoc10;L_allowsubfolders277","uniqueId":1946,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location10","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc10;L_datecolon275","uniqueId":1944,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location10","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc10;L_descriptioncolon276","uniqueId":1945,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location10","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc10;L_pathcolon274","uniqueId":1943,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location10","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc10","uniqueId":1947,"displayName":"Trusted Location #10","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedLoc10;L_pathcolon274","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc10;L_datecolon275","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc10;L_descriptioncolon276","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc10;L_allowsubfolders277","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustedLoc11;L_allowsubfolders281","uniqueId":1951,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location11","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc11;L_datecolon279","uniqueId":1949,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location11","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc11;L_descriptioncolon280","uniqueId":1950,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location11","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc11;L_pathcolon278","uniqueId":1948,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location11","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc11","uniqueId":1952,"displayName":"Trusted Location #11","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedLoc11;L_pathcolon278","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc11;L_datecolon279","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc11;L_descriptioncolon280","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc11;L_allowsubfolders281","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustedLoc12;L_allowsubfolders285","uniqueId":1956,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location12","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc12;L_datecolon283","uniqueId":1954,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location12","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc12;L_descriptioncolon284","uniqueId":1955,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location12","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc12;L_pathcolon282","uniqueId":1953,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location12","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc12","uniqueId":1957,"displayName":"Trusted Location #12","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedLoc12;L_pathcolon282","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc12;L_datecolon283","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc12;L_descriptioncolon284","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc12;L_allowsubfolders285","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustedLoc13;L_allowsubfolders289","uniqueId":1961,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location13","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc13;L_datecolon287","uniqueId":1959,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location13","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc13;L_descriptioncolon288","uniqueId":1960,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location13","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc13;L_pathcolon286","uniqueId":1958,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location13","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc13","uniqueId":1962,"displayName":"Trusted Location #13","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedLoc13;L_pathcolon286","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc13;L_datecolon287","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc13;L_descriptioncolon288","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc13;L_allowsubfolders289","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustedLoc14;L_allowsubfolders293","uniqueId":1966,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location14","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc14;L_datecolon291","uniqueId":1964,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location14","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc14;L_descriptioncolon292","uniqueId":1965,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location14","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc14;L_pathcolon290","uniqueId":1963,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location14","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc14","uniqueId":1967,"displayName":"Trusted Location #14","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedLoc14;L_pathcolon290","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc14;L_datecolon291","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc14;L_descriptioncolon292","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc14;L_allowsubfolders293","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustedLoc15;L_allowsubfolders297","uniqueId":1971,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location15","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc15;L_datecolon295","uniqueId":1969,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location15","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc15;L_descriptioncolon296","uniqueId":1970,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location15","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc15;L_pathcolon294","uniqueId":1968,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location15","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc15","uniqueId":1972,"displayName":"Trusted Location #15","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedLoc15;L_pathcolon294","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc15;L_datecolon295","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc15;L_descriptioncolon296","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc15;L_allowsubfolders297","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustedLoc16;L_allowsubfolders301","uniqueId":1976,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location16","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc16;L_datecolon299","uniqueId":1974,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location16","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc16;L_descriptioncolon300","uniqueId":1975,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location16","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc16;L_pathcolon298","uniqueId":1973,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location16","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc16","uniqueId":1977,"displayName":"Trusted Location #16","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedLoc16;L_pathcolon298","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc16;L_datecolon299","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc16;L_descriptioncolon300","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc16;L_allowsubfolders301","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustedLoc17;L_allowsubfolders305","uniqueId":1981,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location17","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc17;L_datecolon303","uniqueId":1979,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location17","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc17;L_descriptioncolon304","uniqueId":1980,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location17","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc17;L_pathcolon302","uniqueId":1978,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location17","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc17","uniqueId":1982,"displayName":"Trusted Location #17","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedLoc17;L_pathcolon302","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc17;L_datecolon303","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc17;L_descriptioncolon304","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc17;L_allowsubfolders305","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustedLoc18;L_allowsubfolders309","uniqueId":1986,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location18","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc18;L_datecolon307","uniqueId":1984,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location18","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc18;L_descriptioncolon308","uniqueId":1985,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location18","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc18;L_pathcolon306","uniqueId":1983,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location18","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc18","uniqueId":1987,"displayName":"Trusted Location #18","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedLoc18;L_pathcolon306","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc18;L_datecolon307","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc18;L_descriptioncolon308","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc18;L_allowsubfolders309","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustedLoc19;L_allowsubfolders313","uniqueId":1991,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location19","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc19;L_datecolon311","uniqueId":1989,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location19","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc19;L_descriptioncolon312","uniqueId":1990,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location19","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc19;L_pathcolon310","uniqueId":1988,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location19","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc19","uniqueId":1992,"displayName":"Trusted Location #19","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedLoc19;L_pathcolon310","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc19;L_datecolon311","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc19;L_descriptioncolon312","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc19;L_allowsubfolders313","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustedLoc20;L_allowsubfolders317","uniqueId":1996,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location20","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc20;L_datecolon315","uniqueId":1994,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location20","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc20;L_descriptioncolon316","uniqueId":1995,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location20","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc20;L_pathcolon314","uniqueId":1993,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\trusted locations\\all applications\\location20","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_TrustedLoc20","uniqueId":1997,"displayName":"Trusted Location #20","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TrustedLoc20;L_pathcolon314","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc20;L_datecolon315","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc20;L_descriptioncolon316","logicalOperator":"exists","values":null},{"dependee":"office16;L_TrustedLoc20;L_allowsubfolders317","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Warning: These locations are used as a trusted source for opening files in Word, Excel, PowerPoint, Access, InfoPath, and Visio. Macros and ActiveX controls in these documents will execute without user warning. If you change or add a location make sure that the new location is secure.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TrustLegacySignature","uniqueId":2896,"displayName":"Trust legacy VBA signatures","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control how Office loads and verifies legacy Visual Basic for Applications (VBA) signatures.\n\nIf you enable or do not configure this policy setting, Office applications can load and verify legacy VBA signatures.\n\nIf you disable this policy setting, Office applications can’t load or verify legacy VBA signatures. They can only load and verify agile VBA signatures.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies","VBA"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\vba\\security","registrySubPath":"trustlegacysignature","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Turkish","uniqueId":2278,"displayName":"Turkish","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Turkish","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"tr-tr","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Turkmen","uniqueId":2279,"displayName":"Turkmen","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Turkmen","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"tk-tm","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffBlockingOfUnsupportedFileTypesInApplicationGuard","uniqueId":1760,"displayName":"Turn off protection of unsupported file types in Application Guard for Office","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Application Guard for Office will block unsupported file types from being opened in Office apps or if it will enable the redirection to Protected View.\n\nIf you enable this setting, Application Guard for Office will redirect unsupported file types to Protected View in Office apps.\n\nImportant: Be aware that enabling this policy setting might pose a risk to the user's device.\n\nIf you disable or don't configure this setting, Application Guard for Office will block unsupported file types in Office apps.\n\nNote: This policy setting only applies to Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Application Guard","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\applicationguard","registrySubPath":"redirectunsupportedfiletypestopv","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffCameraAndMicrophoneInApplicationGuard","uniqueId":1754,"displayName":"Turn off camera and microphone access for Office apps using Application Guard.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"The policy allows you to control whether Office apps using Application Guard can access the user's camera and microphone if they're enabled on the user's device.\n\nImportant: A compromised Application Guard container could bypass camera and microphone permissions and access the camera and microphone without the user’s knowledge. To prevent unauthorized access, we recommend that the camera and microphone be turned off on the user’s device when they aren’t needed.\n\nIf you enable this policy setting, Office apps using Application Guard won't be able to access the camera and microphone on the user’s device. \n\nIf you disable or don't configure this policy setting, Office apps using Application Guard will be able to access the camera and microphone on the user’s device.\n\nNote: This policy setting only applies to Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Application Guard","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\applicationguard","registrySubPath":"disablecameraandmicrophone","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffClickToIMOption","uniqueId":2320,"displayName":"Turn off click to IM option","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to remove the Instant Messaging (IM) option from the Contact Card and Outlook Ribbon.\n\nIf you enable this policy setting the Instant Messaging icon does not appear on the Contact Card and Outlook Ribbon.\n\nIf you disable or do not configure this policy setting the Instant Messaging icon appears on the Contact Card and Outlook Ribbon.","supportedPlatforms":["Windows"],"tags":["Contact Card","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\im","registrySubPath":"turnoffclicktoim","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffClickToTelephone","uniqueId":2321,"displayName":"Turn off click to telephone","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to remove the telephone option from the Contact Card and Outlook Ribbon.\n\nIf you enable this policy setting, the telephone option does not appear in the Contact Card. Telephone links do not appear in the Contact Card. Telephone options do not appear in the Outlook Ribbon.\n\nIf you disable or do not configure this policy setting telephone options appear in the Contact Card and Outlook Ribbon.","supportedPlatforms":["Windows"],"tags":["Contact Card","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\im","registrySubPath":"turnoffclicktophone","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffClipboardAccessInApplicationGuard;L_AppGuardClipboardDirection","uniqueId":1755,"displayName":"AppGuardClipboardDirection","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable clipboard operation both directions (default)","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable clipboard operation only from the host to the isolated session","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable clipboard operation only from an isolated session to the host","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable clipboard operation both directions","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to control whether users can copy and paste content from Office to and from documents opened in Application Guard, as well as the allowed formats. This policy setting only applies to Word, Excel, and PowerPoint.\n\nIf you enable this policy setting, you must choose from the following behaviors:\n\n- Enable clipboard functionality between the host and Application Guard (default).\n- Disable clipboard functionality completely between the host and Application Guard.\n- Enable the clipboard to copy content from Application Guard to the host.\n- Enable the clipboard to copy content from the host to Application Guard.\n\nNote: Application Guard only allows copying text and images and doesn’t allow copying of rich content.\nImportant: We recommend that you don't enable copying from the host to Application Guard. If you enable this functionality, a potentially compromised Application Guard session will have access to the host device’s clipboard and its content.\n\nYou can also choose the type of content that can be copied, by using the content options:\n- Allows text copying (default).\n- Allows image copying.\n- Allows both text and image copying.\n\nIf you disable or don't configure this policy setting, users can copy and paste content to and from documents opened in Application Guard to other locations outside Application Guard.\n\nNote: Application Guard only allows copying text and images and doesn’t allow copying of rich content.\n\nNote: This policy setting only applies to Microsoft 365 Apps for enterprise.\n      ","supportedPlatforms":["Windows"],"tags":["Application Guard","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\applicationguard","registrySubPath":"clipboarddirection","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffClipboardAccessInApplicationGuard;L_AppGuardClipboardTypeValue","uniqueId":1756,"displayName":"AppGuardClipboardType","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable only text operations in the clipboard (default).","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable only image operations in the clipboard.","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable image and text operations in the clipboard.","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to control whether users can copy and paste content from Office to and from documents opened in Application Guard, as well as the allowed formats. This policy setting only applies to Word, Excel, and PowerPoint.\n\nIf you enable this policy setting, you must choose from the following behaviors:\n\n- Enable clipboard functionality between the host and Application Guard (default).\n- Disable clipboard functionality completely between the host and Application Guard.\n- Enable the clipboard to copy content from Application Guard to the host.\n- Enable the clipboard to copy content from the host to Application Guard.\n\nNote: Application Guard only allows copying text and images and doesn’t allow copying of rich content.\nImportant: We recommend that you don't enable copying from the host to Application Guard. If you enable this functionality, a potentially compromised Application Guard session will have access to the host device’s clipboard and its content.\n\nYou can also choose the type of content that can be copied, by using the content options:\n- Allows text copying (default).\n- Allows image copying.\n- Allows both text and image copying.\n\nIf you disable or don't configure this policy setting, users can copy and paste content to and from documents opened in Application Guard to other locations outside Application Guard.\n\nNote: Application Guard only allows copying text and images and doesn’t allow copying of rich content.\n\nNote: This policy setting only applies to Microsoft 365 Apps for enterprise.\n      ","supportedPlatforms":["Windows"],"tags":["Application Guard","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\applicationguard","registrySubPath":"clipboardformats","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffClipboardAccessInApplicationGuard","uniqueId":1757,"displayName":"Configure copy and paste from Office documents opened in Application Guard","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOffClipboardAccessInApplicationGuard;L_AppGuardClipboardDirection","logicalOperator":"exists","values":null},{"dependee":"office16;L_TurnOffClipboardAccessInApplicationGuard;L_AppGuardClipboardTypeValue","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to control whether users can copy and paste content from Office to and from documents opened in Application Guard, as well as the allowed formats. This policy setting only applies to Word, Excel, and PowerPoint.\n\nIf you enable this policy setting, you must choose from the following behaviors:\n\n- Enable clipboard functionality between the host and Application Guard (default).\n- Disable clipboard functionality completely between the host and Application Guard.\n- Enable the clipboard to copy content from Application Guard to the host.\n- Enable the clipboard to copy content from the host to Application Guard.\n\nNote: Application Guard only allows copying text and images and doesn’t allow copying of rich content.\nImportant: We recommend that you don't enable copying from the host to Application Guard. If you enable this functionality, a potentially compromised Application Guard session will have access to the host device’s clipboard and its content.\n\nYou can also choose the type of content that can be copied, by using the content options:\n- Allows text copying (default).\n- Allows image copying.\n- Allows both text and image copying.\n\nIf you disable or don't configure this policy setting, users can copy and paste content to and from documents opened in Application Guard to other locations outside Application Guard.\n\nNote: Application Guard only allows copying text and images and doesn’t allow copying of rich content.\n\nNote: This policy setting only applies to Microsoft 365 Apps for enterprise.\n      ","supportedPlatforms":["Windows"],"tags":["Application Guard","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOffContactTabCalendar","uniqueId":2420,"displayName":"Remove Calendar Line","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy setting enables you to remove the Calendar line on the Contact Tab, which is on the Contact Card.\n\nIf you enable this policy setting, you can remove the Calendar line.\n\nIf you disable or do not configure this policy setting, the Calendar line appears on the Contact Tab.\n","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoffcontacttabcalendar","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffContactTabLocation","uniqueId":2421,"displayName":"Remove Location Line","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy setting enables you to remove the Location line on the Contact Tab, which is on the Contact Card.\n\nIf you enable this policy setting, you can remove the Location line.\n\nIf you disable or do not configure this policy setting, the Location line appears on the Contact Tab.\n","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoffcontacttablocation","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffErrorReportingForFilesThatFailFileValidation","uniqueId":1752,"displayName":"Turn off error reporting for files that fail file validation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy determines whether error reports and files that fail file validation should be sent using the Watson dialog.\n\nIf you enable this policy setting, users will not see the Watson dialog.  Files that fail file validation will not be sent by the Watson dialog to Microsoft.\n\nIf you disable or do not configure this policy setting, the Watson dialog to send files that fail validation will show up once every two weeks.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\filevalidation","registrySubPath":"disablereporting","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffHardwareAccelerationInApplicationGuard","uniqueId":1759,"displayName":"Disable hardware acceleration for Office in Application Guard","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Office in Application Guard uses hardware or software acceleration to render graphics.\n\nIf you enable this setting, Application Guard uses software-based (CPU) rendering and won’t load any third-party graphics drivers or interact with any connected graphics hardware.\n\nImportant: Be aware that disabling or not configuring this policy setting with potentially compromised graphics devices or drivers might pose a risk to the user's device.\n\nIf you disable or don't configure this setting, Application Guard uses Hyper-V to access supported, high-security rendering graphics hardware (GPUs). These GPUs improve rendering performance and battery life while using Application Guard, particularly for video playback and other graphics-intensive operations. If you disable or don't configure this setting without connecting any high-security rendering graphics hardware, Application Guard will automatically revert to software-based (CPU) rendering.\n\nNote: This policy setting only applies to Microsoft 365 Apps for enterprise. ","supportedPlatforms":["Windows"],"tags":["Application Guard","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\applicationguard","registrySubPath":"disablehardwareacceleration","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffOfficeInApplicationGuard","uniqueId":1758,"displayName":"Don't use Application Guard with Office.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether Office apps use Application Guard to isolate untrusted documents.\n\nIf you enable this policy setting, Office apps won't use Application Guard to isolate untrusted documents even if the device is configured to use Application Guard. Instead, Office will use Protected View to isolate untrusted documents.\n\nNote: You should consider enabling this policy setting if you want to stop Office apps from using Application Guard without impacting the use of Application Guard with other applications.\n\nIf you disable or don't configure this policy settings, Office apps will use Application Guard to isolate untrusted documents. The device must be configured to use Application Guard and the user must be licensed to use Application Guard.","supportedPlatforms":["Windows"],"tags":["Application Guard","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\applicationguard","registrySubPath":"disableappguard","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffOutlookNameDictionaries","uniqueId":2474,"displayName":"Turn off Outlook name dictionaries update","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off updating for Outlook name dictionaries of Microsoft IME (Input Method Editor). This policy setting applies to Japanese Microsoft IME only.\n\nIf you enable this policy setting, all Outlook name dictionaries are not updated.\nOutlook name dictionaries that were added before enabling this policy setting are used for conversion.\n\nIf you disable or do not configure this policy setting, Outlook name dictionaries are generated, updated and used for conversion.","supportedPlatforms":["Windows"],"tags":["IME (Japanese)","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\imejp\\16.0\\wswordcomment\\plugins\\mapi","registrySubPath":"disabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffPDFEncryptionSettingUI","uniqueId":1745,"displayName":"Turn off PDF encryption setting UI","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off the PDF encryption setting UI.\n\nIf you enable this policy setting, the PDF encryption UI is hidden.  If your organization has a higher requirement on encryption than what is supported, the recommendation is to enable this policy setting.\n\nIf you disable or do not configure this policy setting, the PDF encryption UI is shown, and users may choose to encrypt the PDF file or not.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\fixedformat","registrySubPath":"enableencryption","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffPresenceIntegration","uniqueId":2317,"displayName":"Turn off presence integration","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off instant messaging (IM) presence integration for Microsoft Office applications. \n\nIf you enable this policy, setting IM presence icons will not be displayed and presence integration will be turned off for Office applications.\n\nIf you disable or do not configure this policy setting, IM presence icons will be displayed and presence integration will be turned on for Office applications.","supportedPlatforms":["Web","Windows"],"tags":["Contact Card","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\im","registrySubPath":"turnoffpresenceintegration","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffPrintSettingsInApplicationGuard;L_TurnOffLocalPrintingInApplicationGuard","uniqueId":1763,"displayName":"Don’t allow printing to local printers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to control how users can print from Office documents opened in Application Guard. \nIf you enable this policy setting, you can choose to selectively retrict one or more of the following printing options.\n- Don't allow printing to XPS, prevents users from printing as XPS and saving the resulting file on the host. \n- Don't allow printing to PDF, prevents users from printing as PDF and saving the resulting file on the host. \n- Don't allow printing to local printers, prevents users from printing to locally attached printers. \n- Don't allow printing to existing network printers, prevents users from printing to previously connected network printers. Also, users can't search for additional printers.\nNote: if you select all the choices or don’t select any of the choices, then printing isn’t allowed in Application Guard.\n\nIf you disable or don’t configure this policy setting, users can print to all printers configured on their device.\n\nNote: This policy setting only applies to Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Application Guard","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\applicationguard","registrySubPath":"disablelocalprintsettings","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffPrintSettingsInApplicationGuard;L_TurnOffNetworkPrintingInApplicationGuard","uniqueId":1764,"displayName":"Don’t allow printing to existing network printers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to control how users can print from Office documents opened in Application Guard. \nIf you enable this policy setting, you can choose to selectively retrict one or more of the following printing options.\n- Don't allow printing to XPS, prevents users from printing as XPS and saving the resulting file on the host. \n- Don't allow printing to PDF, prevents users from printing as PDF and saving the resulting file on the host. \n- Don't allow printing to local printers, prevents users from printing to locally attached printers. \n- Don't allow printing to existing network printers, prevents users from printing to previously connected network printers. Also, users can't search for additional printers.\nNote: if you select all the choices or don’t select any of the choices, then printing isn’t allowed in Application Guard.\n\nIf you disable or don’t configure this policy setting, users can print to all printers configured on their device.\n\nNote: This policy setting only applies to Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Application Guard","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\applicationguard","registrySubPath":"disablenetworkprintsettings","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffPrintSettingsInApplicationGuard;L_TurnOffPDFPrintingInApplicationGuard","uniqueId":1762,"displayName":"Don’t allow printing to PDF","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to control how users can print from Office documents opened in Application Guard. \nIf you enable this policy setting, you can choose to selectively retrict one or more of the following printing options.\n- Don't allow printing to XPS, prevents users from printing as XPS and saving the resulting file on the host. \n- Don't allow printing to PDF, prevents users from printing as PDF and saving the resulting file on the host. \n- Don't allow printing to local printers, prevents users from printing to locally attached printers. \n- Don't allow printing to existing network printers, prevents users from printing to previously connected network printers. Also, users can't search for additional printers.\nNote: if you select all the choices or don’t select any of the choices, then printing isn’t allowed in Application Guard.\n\nIf you disable or don’t configure this policy setting, users can print to all printers configured on their device.\n\nNote: This policy setting only applies to Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Application Guard","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\applicationguard","registrySubPath":"disablepdfprintsettings","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffPrintSettingsInApplicationGuard","uniqueId":1765,"displayName":"Restrict printing from Office of documents opened in Application Guard","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOffPrintSettingsInApplicationGuard;L_TurnOffXPSPrintingInApplicationGuard","logicalOperator":"exists","values":null},{"dependee":"office16;L_TurnOffPrintSettingsInApplicationGuard;L_TurnOffPDFPrintingInApplicationGuard","logicalOperator":"exists","values":null},{"dependee":"office16;L_TurnOffPrintSettingsInApplicationGuard;L_TurnOffLocalPrintingInApplicationGuard","logicalOperator":"exists","values":null},{"dependee":"office16;L_TurnOffPrintSettingsInApplicationGuard;L_TurnOffNetworkPrintingInApplicationGuard","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to control how users can print from Office documents opened in Application Guard. \nIf you enable this policy setting, you can choose to selectively retrict one or more of the following printing options.\n- Don't allow printing to XPS, prevents users from printing as XPS and saving the resulting file on the host. \n- Don't allow printing to PDF, prevents users from printing as PDF and saving the resulting file on the host. \n- Don't allow printing to local printers, prevents users from printing to locally attached printers. \n- Don't allow printing to existing network printers, prevents users from printing to previously connected network printers. Also, users can't search for additional printers.\nNote: if you select all the choices or don’t select any of the choices, then printing isn’t allowed in Application Guard.\n\nIf you disable or don’t configure this policy setting, users can print to all printers configured on their device.\n\nNote: This policy setting only applies to Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Application Guard","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOffPrintSettingsInApplicationGuard;L_TurnOffXPSPrintingInApplicationGuard","uniqueId":1761,"displayName":"Don’t allow printing to XPS","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to control how users can print from Office documents opened in Application Guard. \nIf you enable this policy setting, you can choose to selectively retrict one or more of the following printing options.\n- Don't allow printing to XPS, prevents users from printing as XPS and saving the resulting file on the host. \n- Don't allow printing to PDF, prevents users from printing as PDF and saving the resulting file on the host. \n- Don't allow printing to local printers, prevents users from printing to locally attached printers. \n- Don't allow printing to existing network printers, prevents users from printing to previously connected network printers. Also, users can't search for additional printers.\nNote: if you select all the choices or don’t select any of the choices, then printing isn’t allowed in Application Guard.\n\nIf you disable or don’t configure this policy setting, users can print to all printers configured on their device.\n\nNote: This policy setting only applies to Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Application Guard","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\applicationguard","registrySubPath":"disablexpsprintsettings","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffScreenClipping","uniqueId":2307,"displayName":"Turn off screen clipping","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off the Insert Screenshot feature.\n\nIf you enable this policy setting, you will turn off the Insert Screenshot feature found in Microsoft Excel, PowerPoint, Outlook, and Word. This setting does not affect the screen clipping feature found in Microsoft OneNote or the Print Screen key on your keyboard.\n\nIf you disable or do not configure this policy setting, the Insert Screenshot feature in Microsoft Excel, PowerPoint, Outlook, and Word will be available. This feature allows users to insert both screen clippings and the contents of an entire active window. ","supportedPlatforms":["Windows"],"tags":["Disable Items in User Interface","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\insert media\\screenshot","registrySubPath":"disablescreenclippings","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffSharePointDictionary","uniqueId":2475,"displayName":"Turn off SharePoint dictionary update","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off updating for SharePoint dictionary of Microsoft IME (Input Method Editor). This policy setting applies to Japanese Microsoft IME only.\n\nIf you enable this policy setting, SharePoint dictionary is not updated, and you cannot add a new SharePoint dictionary.\nA SharePoint dictionary that was added before enabling this policy setting is used for conversion.\n\nIf you disable or do not configure this policy setting, SharePoint dictionary can be updated and added.","supportedPlatforms":["Windows"],"tags":["IME (Japanese)","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\ime\\shared\\16.0\\sharepointdict","registrySubPath":"disabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOffTrustPromotionForDocumentsInApplicationGuard","uniqueId":1753,"displayName":"Prevent users from removing Application Guard protection on files.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether users can remove Application Guard protection and open a document with full trust in Office.\n\nIf you enable this policy setting, users can continue to work with Office documents in Application Guard, however, they cannot remove protection and open a document outside Application Guard.\n\nIf you disable or do not configure this policy settings, Office will by default allow users to remove protection and open a document with full trust.\n\nNote: This policy setting only applies to Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Application Guard","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\applicationguard","registrySubPath":"disabletrustpromotion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabADReplaceBirthday;L_BirthdayADReplace","uniqueId":2386,"displayName":"AD Attribute:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to customize the 16th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"birthday\" of line 16.\n\nIf you disable or do not configure this policy setting, the default value for line 16 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabadreplace16","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabADReplaceBirthday","uniqueId":2387,"displayName":"Replace AD - Birthday","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabADReplaceBirthday;L_BirthdayADReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to customize the 16th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"birthday\" of line 16.\n\nIf you disable or do not configure this policy setting, the default value for line 16 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabADReplaceCompany;L_CompanyADReplace","uniqueId":2378,"displayName":"AD Attribute:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to customize the 12th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"company\" of line 12.\n\nIf you disable or do not configure this policy setting, the default value for line 12 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabadreplace12","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabADReplaceCompany","uniqueId":2379,"displayName":"Replace AD - Company","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabADReplaceCompany;L_CompanyADReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to customize the 12th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"company\" of line 12.\n\nIf you disable or do not configure this policy setting, the default value for line 12 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabADReplaceEmail;L_EmailADReplace","uniqueId":2356,"displayName":"AD Attribute:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to customize the 1st value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"email address\" of line 1.\n\nIf you disable or do not configure this policy setting, the default value for line 1 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabadreplace1","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabADReplaceEmail","uniqueId":2357,"displayName":"Replace AD - E-mail","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabADReplaceEmail;L_EmailADReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to customize the 1st value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"email address\" of line 1.\n\nIf you disable or do not configure this policy setting, the default value for line 1 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabADReplaceHome2;L_Home2ADReplace","uniqueId":2368,"displayName":"AD Attribute:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to customize the 7th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"home phone 2\" of line 7.\n\nIf you disable or do not configure this policy setting, the default value for line 7 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabadreplace7","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabADReplaceHome2","uniqueId":2369,"displayName":"Replace AD - Home2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabADReplaceHome2;L_Home2ADReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to customize the 7th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"home phone 2\" of line 7.\n\nIf you disable or do not configure this policy setting, the default value for line 7 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabADReplaceHomeAdd;L_HomeAddADReplace","uniqueId":2382,"displayName":"AD Attribute:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to customize the 14th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"home address\" of line 14.\n\nIf you disable or do not configure this policy setting, the default value for line 14 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabadreplace14","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabADReplaceHomeAdd","uniqueId":2383,"displayName":"Replace AD - Home Address","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabADReplaceHomeAdd;L_HomeAddADReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to customize the 14th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"home address\" of line 14.\n\nIf you disable or do not configure this policy setting, the default value for line 14 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabADReplaceHome;L_HomeADReplace","uniqueId":2366,"displayName":"AD Attribute:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to customize the 6th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"home phone\" of line 6.\n\nIf you disable or do not configure this policy setting, the default value for line 6 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabadreplace6","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabADReplaceHome","uniqueId":2367,"displayName":"Replace AD - Home","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabADReplaceHome;L_HomeADReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to customize the 6th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"home phone\" of line 6.\n\nIf you disable or do not configure this policy setting, the default value for line 6 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabADReplaceIM;L_IMADReplace","uniqueId":2372,"displayName":"AD Attribute:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to customize the 9th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"IM address\" of line 9.\n\nIf you disable or do not configure this policy setting, the default value for line 9 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabadreplace9","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabADReplaceIM","uniqueId":2373,"displayName":"Replace AD - IM","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabADReplaceIM;L_IMADReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to customize the 9th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"IM address\" of line 9.\n\nIf you disable or do not configure this policy setting, the default value for line 9 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabADReplaceMobile;L_MobileADReplace","uniqueId":2364,"displayName":"AD Attribute:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to customize the 5th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"mobile phone\" of line 5.\n\nIf you disable or do not configure this policy setting, the default value for line 5 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabadreplace5","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabADReplaceMobile","uniqueId":2365,"displayName":"Replace AD - Mobile","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabADReplaceMobile;L_MobileADReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to customize the 5th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"mobile phone\" of line 5.\n\nIf you disable or do not configure this policy setting, the default value for line 5 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabADReplaceOffice;L_OfficeADReplace","uniqueId":2376,"displayName":"AD Attribute:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to customize the 11th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"office location\" of line 11.\n\nIf you disable or do not configure this policy setting, the default value for line 11 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabadreplace11","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabADReplaceOffice","uniqueId":2377,"displayName":"Replace AD - Office","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabADReplaceOffice;L_OfficeADReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to customize the 11th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"office location\" of line 11.\n\nIf you disable or do not configure this policy setting, the default value for line 11 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabADReplaceOtherAdd;L_OtherAddADReplace","uniqueId":2384,"displayName":"AD Attribute:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to customize the 15th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"other address\" of line 15.\n\nIf you disable or do not configure this policy setting, the default value for line 15 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabadreplace15","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabADReplaceOtherAdd","uniqueId":2385,"displayName":"Replace AD - Other Address","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabADReplaceOtherAdd;L_OtherAddADReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to customize the 15th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"other address\" of line 15.\n\nIf you disable or do not configure this policy setting, the default value for line 15 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabADReplaceOther;L_OtherADReplace","uniqueId":2370,"displayName":"AD Attribute:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to customize the 8th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"other phone\" of line 8.\n\nIf you disable or do not configure this policy setting, the default value for line 8 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabadreplace8","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabADReplaceOther","uniqueId":2371,"displayName":"Replace AD - Other","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabADReplaceOther;L_OtherADReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to customize the 8th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"other phone\" of line 8.\n\nIf you disable or do not configure this policy setting, the default value for line 8 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabADReplaceProfile;L_ProfileADReplace","uniqueId":2374,"displayName":"AD Attribute:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to customize the 10th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"profile\" of line 10.\n\nIf you disable or do not configure this policy setting, the default value for line 10 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabadreplace10","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabADReplaceProfile","uniqueId":2375,"displayName":"Replace AD - Profile","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabADReplaceProfile;L_ProfileADReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to customize the 10th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"profile\" of line 10.\n\nIf you disable or do not configure this policy setting, the default value for line 10 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabADReplaceWork2","uniqueId":2361,"displayName":"Replace AD - Work2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabADReplaceWork2;L_Work2ADReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to customize the 3rd value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"work phone 2\" of line 3.\n\nIf you disable or do not configure this policy setting, the default value for line 3 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabADReplaceWork2;L_Work2ADReplace","uniqueId":2360,"displayName":"AD Attribute:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to customize the 3rd value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"work phone 2\" of line 3.\n\nIf you disable or do not configure this policy setting, the default value for line 3 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabadreplace3","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabADReplaceWorkAdd","uniqueId":2381,"displayName":"Replace AD - Work Address","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabADReplaceWorkAdd;L_WorkAddADReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to customize the 13th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"work address\" of line 13.\n\nIf you disable or do not configure this policy setting, the default value for line 13 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabADReplaceWorkAdd;L_WorkAddADReplace","uniqueId":2380,"displayName":"AD Attribute:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to customize the 13th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"work address\" of line 13.\n\nIf you disable or do not configure this policy setting, the default value for line 13 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabadreplace13","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabADReplaceWorkFax","uniqueId":2363,"displayName":"Replace AD - WorkFax","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabADReplaceWorkFax;L_WorkFaxADReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to customize the 4th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"work fax\" of line 4.\n\nIf you disable or do not configure this policy setting, the default value for line 4 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabADReplaceWorkFax;L_WorkFaxADReplace","uniqueId":2362,"displayName":"AD Attribute:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to customize the 4th value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"work fax\" of line 4.\n\nIf you disable or do not configure this policy setting, the default value for line 4 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabadreplace4","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabADReplaceWork","uniqueId":2359,"displayName":"Replace AD - Work","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabADReplaceWork;L_WorkADReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to customize the 2nd value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"work phone\" of line 2.\n\nIf you disable or do not configure this policy setting, the default value for line 2 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabADReplaceWork;L_WorkADReplace","uniqueId":2358,"displayName":"AD Attribute:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to customize the 2nd value of the Contact Tab.\n\nIf you enable this policy setting, you can change or remove the default value - \"work phone\" of line 2.\n\nIf you disable or do not configure this policy setting, the default value for line 2 is displayed.\n\nImportant:\nIt is recommended that you specify a Messaging Application Programming Interface (MAPI) property and a corresponding Active Directory attribute (AD attribute).  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in this format: ADAttribute.  Any properties entered which are binary or list box, cannot be displayed and are ignored.\n\nExample:\nTo display the Assistant on the Contact Card, enter the AD attribute: Ms-exch-assistant-name.\n\nTo remove the value, enter: null.\n\nNote: \nThe Location and Calendar values for a default Contact Card are not MAPI Properties or AD Attributes.  \n\nRelated policy settings:  \nReplace MAPI property n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabadreplace2","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabLabelReplaceBirthday;L_BirthdayLabelReplace","uniqueId":2354,"displayName":"Label:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to change or remove the 16th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttablabelreplace16","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabLabelReplaceBirthday","uniqueId":2355,"displayName":"Replace Label - Birthday","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabLabelReplaceBirthday;L_BirthdayLabelReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to change or remove the 16th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabLabelReplaceCompany;L_CompanyLabelReplace","uniqueId":2346,"displayName":"Label:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to change or remove the 12th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttablabelreplace12","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabLabelReplaceCompany","uniqueId":2347,"displayName":"Replace Label - Company","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabLabelReplaceCompany;L_CompanyLabelReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to change or remove the 12th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabLabelReplaceEmail;L_EmailLabelReplace","uniqueId":2324,"displayName":"Label:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to change or remove the 1st label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttablabelreplace1","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabLabelReplaceEmail","uniqueId":2325,"displayName":"Replace Label - E-mail","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabLabelReplaceEmail;L_EmailLabelReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to change or remove the 1st label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabLabelReplaceHome2;L_Home2LabelReplace","uniqueId":2336,"displayName":"Label:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to change or remove the 7th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttablabelreplace7","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabLabelReplaceHome2","uniqueId":2337,"displayName":"Replace Label - Home2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabLabelReplaceHome2;L_Home2LabelReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to change or remove the 7th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabLabelReplaceHomeAdd;L_HomeAddLabelReplace","uniqueId":2350,"displayName":"Label:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to change or remove the 14th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttablabelreplace14","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabLabelReplaceHomeAdd","uniqueId":2351,"displayName":"Replace Label - Home Address","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabLabelReplaceHomeAdd;L_HomeAddLabelReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to change or remove the 14th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabLabelReplaceHome;L_HomeLabelReplace","uniqueId":2334,"displayName":"Label:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to change or remove the 6th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttablabelreplace6","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabLabelReplaceHome","uniqueId":2335,"displayName":"Replace Label - Home","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabLabelReplaceHome;L_HomeLabelReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to change or remove the 6th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabLabelReplaceIM;L_IMLabelReplace","uniqueId":2340,"displayName":"Label:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to change or remove the 9th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttablabelreplace9","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabLabelReplaceIM","uniqueId":2341,"displayName":"Replace Label - IM","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabLabelReplaceIM;L_IMLabelReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to change or remove the 9th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabLabelReplaceMobile;L_MobileLabelReplace","uniqueId":2332,"displayName":"Label:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to change or remove the 5th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttablabelreplace5","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabLabelReplaceMobile","uniqueId":2333,"displayName":"Replace Label - Mobile","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabLabelReplaceMobile;L_MobileLabelReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to change or remove the 5th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabLabelReplaceOffice;L_OfficeLabelReplace","uniqueId":2344,"displayName":"Label:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to change or remove the 11th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttablabelreplace11","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabLabelReplaceOffice","uniqueId":2345,"displayName":"Replace Label - Office","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabLabelReplaceOffice;L_OfficeLabelReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to change or remove the 11th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabLabelReplaceOtherAdd;L_OtherAddLabelReplace","uniqueId":2352,"displayName":"Label:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to change or remove the 15th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttablabelreplace15","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabLabelReplaceOtherAdd","uniqueId":2353,"displayName":"Replace Label - Other Address","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabLabelReplaceOtherAdd;L_OtherAddLabelReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to change or remove the 15th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabLabelReplaceOther;L_OtherLabelReplace","uniqueId":2338,"displayName":"Label:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to change or remove the 8th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttablabelreplace8","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabLabelReplaceOther","uniqueId":2339,"displayName":"Replace Label - Other","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabLabelReplaceOther;L_OtherLabelReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to change or remove the 8th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabLabelReplaceProfile;L_ProfileLabelReplace","uniqueId":2342,"displayName":"Label:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to change or remove the 10th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttablabelreplace10","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabLabelReplaceProfile","uniqueId":2343,"displayName":"Replace Label - Profile","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabLabelReplaceProfile;L_ProfileLabelReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to change or remove the 10th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabLabelReplaceWork2","uniqueId":2329,"displayName":"Replace Label - Work2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabLabelReplaceWork2;L_Work2LabelReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to change or remove the 3rd label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabLabelReplaceWork2;L_Work2LabelReplace","uniqueId":2328,"displayName":"Label:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to change or remove the 3rd label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttablabelreplace3","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabLabelReplaceWorkAdd","uniqueId":2349,"displayName":"Replace Label - Work Address","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabLabelReplaceWorkAdd;L_WorkAddLabelReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to change or remove the 13th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabLabelReplaceWorkAdd;L_WorkAddLabelReplace","uniqueId":2348,"displayName":"Label:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to change or remove the 13th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttablabelreplace13","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabLabelReplaceWorkFax","uniqueId":2331,"displayName":"Replace Label - WorkFax","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabLabelReplaceWorkFax;L_WorkFaxLabelReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to change or remove the 4th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabLabelReplaceWorkFax;L_WorkFaxLabelReplace","uniqueId":2330,"displayName":"Label:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to change or remove the 4th label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \n\nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttablabelreplace4","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabLabelReplaceWork","uniqueId":2327,"displayName":"Replace Label - Work","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabLabelReplaceWork;L_WorkLabelReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to change or remove the 2nd label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabLabelReplaceWork;L_WorkLabelReplace","uniqueId":2326,"displayName":"Label:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to change or remove the 2nd label on the Contact Tab, which is on the Contact Card. The default values for the Contact Tab labels are Email (email address), Work (work phone), Work2 (work phone 2), WorkFax (work fax), Mobile (mobile phone), Home (home phone), Home2 (home phone 2), Other (other phone), IM (IM address), Profile (profile), Office (office location), Company (company), WorkAdd (work address), HomeAdd (home address), OtherAdd (other address), Birthday (birthday) . \n\nIf you enable this policy setting, you can change or remove the labels on their Contact Tab by entering a new text string in the text box below. \nIf you disable or do not configure this policy setting, the default label is displayed.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttablabelreplace2","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabMAPIReplaceBirthday;L_BirthdayMAPIReplace","uniqueId":2418,"displayName":"MAPI Property:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":4000000000},"dataType":"Integer"},"description":"If you enable this policy setting, you can remove or change the default value \"birthday\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"birthday\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabmapireplace16","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabMAPIReplaceBirthday","uniqueId":2419,"displayName":"Replace MAPI - Birthday","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabMAPIReplaceBirthday;L_BirthdayMAPIReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"If you enable this policy setting, you can remove or change the default value \"birthday\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"birthday\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabMAPIReplaceCompany;L_CompanyMAPIReplace","uniqueId":2410,"displayName":"MAPI Property:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":4000000000},"dataType":"Integer"},"description":"If you enable this policy setting, you can remove or change the default value \"company\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"company\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabmapireplace12","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabMAPIReplaceCompany","uniqueId":2411,"displayName":"Replace MAPI - Company","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabMAPIReplaceCompany;L_CompanyMAPIReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"If you enable this policy setting, you can remove or change the default value \"company\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"company\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabMAPIReplaceEmail;L_EmailMAPIReplace","uniqueId":2388,"displayName":"MAPI Property:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":4000000000},"dataType":"Integer"},"description":"If you enable this policy setting, you can remove or change the default value \"email address\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"email address\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabmapireplace1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabMAPIReplaceEmail","uniqueId":2389,"displayName":"Replace MAPI - E-mail","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabMAPIReplaceEmail;L_EmailMAPIReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"If you enable this policy setting, you can remove or change the default value \"email address\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"email address\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabMAPIReplaceHome2;L_Home2MAPIReplace","uniqueId":2400,"displayName":"MAPI Property:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":4000000000},"dataType":"Integer"},"description":"If you enable this policy setting, you can remove or change the default value \"home phone 2\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"home phone 2\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabmapireplace7","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabMAPIReplaceHome2","uniqueId":2401,"displayName":"Replace MAPI - Home2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabMAPIReplaceHome2;L_Home2MAPIReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"If you enable this policy setting, you can remove or change the default value \"home phone 2\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"home phone 2\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabMAPIReplaceHomeAdd;L_HomeAddMAPIReplace","uniqueId":2414,"displayName":"MAPI Property:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":4000000000},"dataType":"Integer"},"description":"If you enable this policy setting, you can remove or change the default value \"home address\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"home address\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabmapireplace14","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabMAPIReplaceHomeAdd","uniqueId":2415,"displayName":"Replace MAPI - Home Address","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabMAPIReplaceHomeAdd;L_HomeAddMAPIReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"If you enable this policy setting, you can remove or change the default value \"home address\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"home address\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabMAPIReplaceHome;L_HomeMAPIReplace","uniqueId":2398,"displayName":"MAPI Property:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":4000000000},"dataType":"Integer"},"description":"If you enable this policy setting, you can remove or change the default value \"home phone\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"home phone\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabmapireplace6","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabMAPIReplaceHome","uniqueId":2399,"displayName":"Replace MAPI - Home","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabMAPIReplaceHome;L_HomeMAPIReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"If you enable this policy setting, you can remove or change the default value \"home phone\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"home phone\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabMAPIReplaceIM;L_IMMAPIReplace","uniqueId":2404,"displayName":"MAPI Property:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":4000000000},"dataType":"Integer"},"description":"If you enable this policy setting, you can remove or change the default value \"IM address\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"IM address\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabmapireplace9","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabMAPIReplaceIM","uniqueId":2405,"displayName":"Replace MAPI - IM","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabMAPIReplaceIM;L_IMMAPIReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"If you enable this policy setting, you can remove or change the default value \"IM address\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"IM address\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabMAPIReplaceMobile;L_MobileMAPIReplace","uniqueId":2396,"displayName":"MAPI Property:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":4000000000},"dataType":"Integer"},"description":"If you enable this policy setting, you can remove or change the default value \"mobile phone\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"mobile phone\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabmapireplace5","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabMAPIReplaceMobile","uniqueId":2397,"displayName":"Replace MAPI - Mobile","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabMAPIReplaceMobile;L_MobileMAPIReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"If you enable this policy setting, you can remove or change the default value \"mobile phone\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"mobile phone\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabMAPIReplaceOffice;L_OfficeMAPIReplace","uniqueId":2408,"displayName":"MAPI Property:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":4000000000},"dataType":"Integer"},"description":"If you enable this policy setting, you can remove or change the default value \"office location\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"office location\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabmapireplace11","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabMAPIReplaceOffice","uniqueId":2409,"displayName":"Replace MAPI - Office","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabMAPIReplaceOffice;L_OfficeMAPIReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"If you enable this policy setting, you can remove or change the default value \"office location\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"office location\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabMAPIReplaceOtherAdd;L_OtherAddMAPIReplace","uniqueId":2416,"displayName":"MAPI Property:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":4000000000},"dataType":"Integer"},"description":"If you enable this policy setting, you can remove or change the default value \"other address\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"other address\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabmapireplace15","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabMAPIReplaceOtherAdd","uniqueId":2417,"displayName":"Replace MAPI - Other Address","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabMAPIReplaceOtherAdd;L_OtherAddMAPIReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"If you enable this policy setting, you can remove or change the default value \"other address\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"other address\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabMAPIReplaceOther;L_OtherMAPIReplace","uniqueId":2402,"displayName":"MAPI Property:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":4000000000},"dataType":"Integer"},"description":"If you enable this policy setting, you can remove or change the default value \"other phone\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"other phone\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabmapireplace8","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabMAPIReplaceOther","uniqueId":2403,"displayName":"Replace MAPI - Other","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabMAPIReplaceOther;L_OtherMAPIReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"If you enable this policy setting, you can remove or change the default value \"other phone\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"other phone\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabMAPIReplaceProfile;L_ProfileMAPIReplace","uniqueId":2406,"displayName":"MAPI Property:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":4000000000},"dataType":"Integer"},"description":"If you enable this policy setting, you can remove or change the default value \"profile\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"profile\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabmapireplace10","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabMAPIReplaceProfile","uniqueId":2407,"displayName":"Replace MAPI - Profile","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabMAPIReplaceProfile;L_ProfileMAPIReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"If you enable this policy setting, you can remove or change the default value \"profile\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"profile\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabMAPIReplaceWork2","uniqueId":2393,"displayName":"Replace MAPI - Work2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabMAPIReplaceWork2;L_Work2MAPIReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"If you enable this policy setting, you can remove or change the default value \"work phone 2\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"work phone 2\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabMAPIReplaceWork2;L_Work2MAPIReplace","uniqueId":2392,"displayName":"MAPI Property:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":4000000000},"dataType":"Integer"},"description":"If you enable this policy setting, you can remove or change the default value \"work phone 2\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"work phone 2\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabmapireplace3","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabMAPIReplaceWorkAdd","uniqueId":2413,"displayName":"Replace MAPI - Work Address","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabMAPIReplaceWorkAdd;L_WorkAddMAPIReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"If you enable this policy setting, you can remove or change the default value \"work address\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"work address\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabMAPIReplaceWorkAdd;L_WorkAddMAPIReplace","uniqueId":2412,"displayName":"MAPI Property:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":4000000000},"dataType":"Integer"},"description":"If you enable this policy setting, you can remove or change the default value \"work address\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"work address\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabmapireplace13","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabMAPIReplaceWorkFax","uniqueId":2395,"displayName":"Replace MAPI - WorkFax","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabMAPIReplaceWorkFax;L_WorkFaxMAPIReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"If you enable this policy setting, you can remove or change the default value \"work fax\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"work fax\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabMAPIReplaceWorkFax;L_WorkFaxMAPIReplace","uniqueId":2394,"displayName":"MAPI Property:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":4000000000},"dataType":"Integer"},"description":"If you enable this policy setting, you can remove or change the default value \"work fax\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"work fax\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabmapireplace4","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOnContactTabMAPIReplaceWork","uniqueId":2391,"displayName":"Replace MAPI - Work","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_TurnOnContactTabMAPIReplaceWork;L_WorkMAPIReplace","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"If you enable this policy setting, you can remove or change the default value \"work phone\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"work phone\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_TurnOnContactTabMAPIReplaceWork;L_WorkMAPIReplace","uniqueId":2390,"displayName":"MAPI Property:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":4000000000},"dataType":"Integer"},"description":"If you enable this policy setting, you can remove or change the default value \"work phone\".\n\nIt is recommended that you specify a MAPI property and a corresponding AD attribute.  The MAPI property should always be specified, unless Outlook is not installed, in which case only the AD attribute needs to be specified.  It must be entered in decimal format.  \n\nIf you know the MAPIHexadecimalPropertyTag, you should convert this to a decimal value.  Any properties entered which are binary or list box, cannot be displayed and thus are ignored.\n\nFor example, if you want to show the Assistant on the Contact Card, for MAPI, the PR_ASSISTANT hexadecimal property tag is 0x3A30001E.  In decimal format, it is 976224286.\n\nYou would enter: \n976224286.\n\nTo remove the value entirely you would enter null.\n\nNote that for Location and Calendar values on the default Contact Card, the defaults are not MAPI Properties or AD Attributes.\n\nRelated policy settings:  \nReplace AD attribute n, Turn On Contact Tab Calendar Line Move, Turn On Contact Tab Location Line Move.\n\nIf you disable or do not configure this policy setting, the default value of \"work phone\" is shown.","supportedPlatforms":["Windows"],"tags":["Contact Tab","Contact Card","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\contactcard","registrySubPath":"turnoncontacttabmapireplace2","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_TurnOnFileSynchronizationViaSOAPOverHTTP","uniqueId":2537,"displayName":"Turn on file synchronization via SOAP over HTTP","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls file synchronization via SOAP over HTTP.\n\nIf you enable or do not configure this policy setting, file synchronization via SOAP over HTTP is turned on.  Turning file synchronization on here will still allow application-specific file synchronization to be turned off.\n\nIf you disable this policy setting this policy setting, file synchronization via SOAP over HTTP is turned off.  You will turn off file synchronization via SOAP over HTTP for other applications even if the application-specific file synchronization is turned on.\n\nImportant: If you disable this policy setting, which will turn off file synchronization via SOAP over HTTP, you will also prevent co-authoring for Word and PowerPoint, and it will adversely affect the behavior of SharePoint Workspaces.","supportedPlatforms":["Windows"],"tags":["Server Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"fsshttpoff","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Ukrainian","uniqueId":2281,"displayName":"Ukrainian","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Ukrainian","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"uk-ua","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc01;L_Allowsubfolders01","uniqueId":1770,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location1","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc01;L_Pathcolon01","uniqueId":1769,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location1","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc01","uniqueId":1771,"displayName":"Unsafe Location #1","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UnsafeLoc01;L_Pathcolon01","logicalOperator":"exists","values":null},{"dependee":"office16;L_UnsafeLoc01;L_Allowsubfolders01","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_UnsafeLoc02;L_Allowsubfolders02","uniqueId":1773,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location2","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc02;L_Pathcolon02","uniqueId":1772,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location2","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc02","uniqueId":1774,"displayName":"Unsafe Location #2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UnsafeLoc02;L_Pathcolon02","logicalOperator":"exists","values":null},{"dependee":"office16;L_UnsafeLoc02;L_Allowsubfolders02","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_UnsafeLoc03;L_Allowsubfolders03","uniqueId":1776,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location3","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc03;L_Pathcolon03","uniqueId":1775,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location3","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc03","uniqueId":1777,"displayName":"Unsafe Location #3","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UnsafeLoc03;L_Pathcolon03","logicalOperator":"exists","values":null},{"dependee":"office16;L_UnsafeLoc03;L_Allowsubfolders03","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_UnsafeLoc04;L_Allowsubfolders04","uniqueId":1779,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location4","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc04;L_Pathcolon04","uniqueId":1778,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location4","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc04","uniqueId":1780,"displayName":"Unsafe Location #4","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UnsafeLoc04;L_Pathcolon04","logicalOperator":"exists","values":null},{"dependee":"office16;L_UnsafeLoc04;L_Allowsubfolders04","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_UnsafeLoc05;L_Allowsubfolders05","uniqueId":1782,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location5","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc05;L_Pathcolon05","uniqueId":1781,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location5","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc05","uniqueId":1783,"displayName":"Unsafe Location #5","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UnsafeLoc05;L_Pathcolon05","logicalOperator":"exists","values":null},{"dependee":"office16;L_UnsafeLoc05;L_Allowsubfolders05","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_UnsafeLoc06;L_Allowsubfolders06","uniqueId":1785,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location6","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc06;L_Pathcolon06","uniqueId":1784,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location6","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc06","uniqueId":1786,"displayName":"Unsafe Location #6","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UnsafeLoc06;L_Pathcolon06","logicalOperator":"exists","values":null},{"dependee":"office16;L_UnsafeLoc06;L_Allowsubfolders06","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_UnsafeLoc07;L_Allowsubfolders07","uniqueId":1788,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location7","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc07;L_Pathcolon07","uniqueId":1787,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location7","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc07","uniqueId":1789,"displayName":"Unsafe Location #7","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UnsafeLoc07;L_Pathcolon07","logicalOperator":"exists","values":null},{"dependee":"office16;L_UnsafeLoc07;L_Allowsubfolders07","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_UnsafeLoc08;L_Allowsubfolders08","uniqueId":1791,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location8","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc08;L_Pathcolon08","uniqueId":1790,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location8","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc08","uniqueId":1792,"displayName":"Unsafe Location #8","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UnsafeLoc08;L_Pathcolon08","logicalOperator":"exists","values":null},{"dependee":"office16;L_UnsafeLoc08;L_Allowsubfolders08","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_UnsafeLoc09;L_Allowsubfolders09","uniqueId":1794,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location9","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc09;L_Pathcolon09","uniqueId":1793,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location9","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc09","uniqueId":1795,"displayName":"Unsafe Location #9","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UnsafeLoc09;L_Pathcolon09","logicalOperator":"exists","values":null},{"dependee":"office16;L_UnsafeLoc09;L_Allowsubfolders09","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_UnsafeLoc10;L_Allowsubfolders10","uniqueId":1797,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location10","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc10;L_Pathcolon10","uniqueId":1796,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location10","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc10","uniqueId":1798,"displayName":"Unsafe Location #10","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UnsafeLoc10;L_Pathcolon10","logicalOperator":"exists","values":null},{"dependee":"office16;L_UnsafeLoc10;L_Allowsubfolders10","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_UnsafeLoc11;L_Allowsubfolders11","uniqueId":1800,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location11","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc11;L_Pathcolon11","uniqueId":1799,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location11","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc11","uniqueId":1801,"displayName":"Unsafe Location #11","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UnsafeLoc11;L_Pathcolon11","logicalOperator":"exists","values":null},{"dependee":"office16;L_UnsafeLoc11;L_Allowsubfolders11","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_UnsafeLoc12;L_Allowsubfolders12","uniqueId":1803,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location12","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc12;L_Pathcolon12","uniqueId":1802,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location12","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc12","uniqueId":1804,"displayName":"Unsafe Location #12","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UnsafeLoc12;L_Pathcolon12","logicalOperator":"exists","values":null},{"dependee":"office16;L_UnsafeLoc12;L_Allowsubfolders12","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_UnsafeLoc13;L_Allowsubfolders13","uniqueId":1806,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location13","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc13;L_Pathcolon13","uniqueId":1805,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location13","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc13","uniqueId":1807,"displayName":"Unsafe Location #13","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UnsafeLoc13;L_Pathcolon13","logicalOperator":"exists","values":null},{"dependee":"office16;L_UnsafeLoc13;L_Allowsubfolders13","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_UnsafeLoc14;L_Allowsubfolders14","uniqueId":1809,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location14","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc14;L_Pathcolon14","uniqueId":1808,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location14","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc14","uniqueId":1810,"displayName":"Unsafe Location #14","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UnsafeLoc14;L_Pathcolon14","logicalOperator":"exists","values":null},{"dependee":"office16;L_UnsafeLoc14;L_Allowsubfolders14","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_UnsafeLoc15;L_Allowsubfolders15","uniqueId":1812,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location15","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc15;L_Pathcolon15","uniqueId":1811,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location15","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc15","uniqueId":1813,"displayName":"Unsafe Location #15","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UnsafeLoc15;L_Pathcolon15","logicalOperator":"exists","values":null},{"dependee":"office16;L_UnsafeLoc15;L_Allowsubfolders15","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_UnsafeLoc16;L_Allowsubfolders16","uniqueId":1815,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location16","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc16;L_Pathcolon16","uniqueId":1814,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location16","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc16","uniqueId":1816,"displayName":"Unsafe Location #16","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UnsafeLoc16;L_Pathcolon16","logicalOperator":"exists","values":null},{"dependee":"office16;L_UnsafeLoc16;L_Allowsubfolders16","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_UnsafeLoc17;L_Allowsubfolders17","uniqueId":1818,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location17","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc17;L_Pathcolon17","uniqueId":1817,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location17","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc17","uniqueId":1819,"displayName":"Unsafe Location #17","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UnsafeLoc17;L_Pathcolon17","logicalOperator":"exists","values":null},{"dependee":"office16;L_UnsafeLoc17;L_Allowsubfolders17","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_UnsafeLoc18;L_Allowsubfolders18","uniqueId":1821,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location18","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc18;L_Pathcolon18","uniqueId":1820,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location18","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc18","uniqueId":1822,"displayName":"Unsafe Location #18","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UnsafeLoc18;L_Pathcolon18","logicalOperator":"exists","values":null},{"dependee":"office16;L_UnsafeLoc18;L_Allowsubfolders18","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_UnsafeLoc19;L_Allowsubfolders19","uniqueId":1824,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location19","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc19;L_Pathcolon19","uniqueId":1823,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location19","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc19","uniqueId":1825,"displayName":"Unsafe Location #19","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UnsafeLoc19;L_Pathcolon19","logicalOperator":"exists","values":null},{"dependee":"office16;L_UnsafeLoc19;L_Allowsubfolders19","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_UnsafeLoc20;L_Allowsubfolders20","uniqueId":1827,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location20","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc20;L_Pathcolon20","uniqueId":1826,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\protectedview\\locations\\location20","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UnsafeLoc20","uniqueId":1828,"displayName":"Unsafe Location #20","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UnsafeLoc20;L_Pathcolon20","logicalOperator":"exists","values":null},{"dependee":"office16;L_UnsafeLoc20;L_Allowsubfolders20","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location containing files that should always open in Protected View.\n\nIf you enable this policy setting, you can specify a location containing files that always open in Protected View.  If you check the \"Allow sub folders\" option, sub folders will also be included.\n\nIf you disable or do not configure this policy setting, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders will be considered unsafe locations.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_UpdateChannelSelectorUser;L_UC_InsiderFast","uniqueId":2966,"displayName":"Beta Channel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls whether the Update Channel option is shown under File > Account in an app, such as Word. This option allows users to select which update channel they want to receive updates from.\n\nFor more information about update channels, see https://go.microsoft.com/fwlink/p/?linkid=846105.\n\nIf you enable this policy setting, the Update Channel option is shown under File > Account. You need to select which update channels will be shown as options to the user.\n\nImportant:\n- Users must be a local administrator on the device to change to a different update channel.\n- Beta Channel is not a supported update channel. It should only be used in test environments and by a small group of select users, such as IT staff or application developers.\n\nIf you disable or don’t configure this policy setting, the Update Channel option is not shown under File > Account.\n\nNotes:\n- This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.\n- This policy setting takes precedence over the “Show the option for Microsoft 365 Insider” policy setting in cases where both policy settings are enabled.\n- If you enable this policy setting, you shouldn’t enable and configure the “Target Version”, “Update Channel”, or “Update Path” policy settings under Computer Configuration\\Policies\\Administrative Templates\\Microsoft Office 2016 (Machine)\\Updates. If you do, those policy settings will take precedence. The Update Channel option will still appear under File > Account, but it will be disabled and the user won’t be able to select an update channel.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\officechannelexposure","registrySubPath":"insiderfast","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UpdateChannelSelectorUser;L_UC_InsiderSlow","uniqueId":2967,"displayName":"Current Channel (Preview)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls whether the Update Channel option is shown under File > Account in an app, such as Word. This option allows users to select which update channel they want to receive updates from.\n\nFor more information about update channels, see https://go.microsoft.com/fwlink/p/?linkid=846105.\n\nIf you enable this policy setting, the Update Channel option is shown under File > Account. You need to select which update channels will be shown as options to the user.\n\nImportant:\n- Users must be a local administrator on the device to change to a different update channel.\n- Beta Channel is not a supported update channel. It should only be used in test environments and by a small group of select users, such as IT staff or application developers.\n\nIf you disable or don’t configure this policy setting, the Update Channel option is not shown under File > Account.\n\nNotes:\n- This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.\n- This policy setting takes precedence over the “Show the option for Microsoft 365 Insider” policy setting in cases where both policy settings are enabled.\n- If you enable this policy setting, you shouldn’t enable and configure the “Target Version”, “Update Channel”, or “Update Path” policy settings under Computer Configuration\\Policies\\Administrative Templates\\Microsoft Office 2016 (Machine)\\Updates. If you do, those policy settings will take precedence. The Update Channel option will still appear under File > Account, but it will be disabled and the user won’t be able to select an update channel.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\officechannelexposure","registrySubPath":"firstreleasecurrent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UpdateChannelSelectorUser;L_UC_MEC","uniqueId":2969,"displayName":"Monthly Enterprise Channel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls whether the Update Channel option is shown under File > Account in an app, such as Word. This option allows users to select which update channel they want to receive updates from.\n\nFor more information about update channels, see https://go.microsoft.com/fwlink/p/?linkid=846105.\n\nIf you enable this policy setting, the Update Channel option is shown under File > Account. You need to select which update channels will be shown as options to the user.\n\nImportant:\n- Users must be a local administrator on the device to change to a different update channel.\n- Beta Channel is not a supported update channel. It should only be used in test environments and by a small group of select users, such as IT staff or application developers.\n\nIf you disable or don’t configure this policy setting, the Update Channel option is not shown under File > Account.\n\nNotes:\n- This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.\n- This policy setting takes precedence over the “Show the option for Microsoft 365 Insider” policy setting in cases where both policy settings are enabled.\n- If you enable this policy setting, you shouldn’t enable and configure the “Target Version”, “Update Channel”, or “Update Path” policy settings under Computer Configuration\\Policies\\Administrative Templates\\Microsoft Office 2016 (Machine)\\Updates. If you do, those policy settings will take precedence. The Update Channel option will still appear under File > Account, but it will be disabled and the user won’t be able to select an update channel.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\officechannelexposure","registrySubPath":"monthlyenterprise","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UpdateChannelSelectorUser;L_UC_Production","uniqueId":2968,"displayName":"Current Channel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls whether the Update Channel option is shown under File > Account in an app, such as Word. This option allows users to select which update channel they want to receive updates from.\n\nFor more information about update channels, see https://go.microsoft.com/fwlink/p/?linkid=846105.\n\nIf you enable this policy setting, the Update Channel option is shown under File > Account. You need to select which update channels will be shown as options to the user.\n\nImportant:\n- Users must be a local administrator on the device to change to a different update channel.\n- Beta Channel is not a supported update channel. It should only be used in test environments and by a small group of select users, such as IT staff or application developers.\n\nIf you disable or don’t configure this policy setting, the Update Channel option is not shown under File > Account.\n\nNotes:\n- This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.\n- This policy setting takes precedence over the “Show the option for Microsoft 365 Insider” policy setting in cases where both policy settings are enabled.\n- If you enable this policy setting, you shouldn’t enable and configure the “Target Version”, “Update Channel”, or “Update Path” policy settings under Computer Configuration\\Policies\\Administrative Templates\\Microsoft Office 2016 (Machine)\\Updates. If you do, those policy settings will take precedence. The Update Channel option will still appear under File > Account, but it will be disabled and the user won’t be able to select an update channel.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\officechannelexposure","registrySubPath":"current","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UpdateChannelSelectorUser;L_UC_SAE","uniqueId":2971,"displayName":"Semi-Annual Enterprise Channel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls whether the Update Channel option is shown under File > Account in an app, such as Word. This option allows users to select which update channel they want to receive updates from.\n\nFor more information about update channels, see https://go.microsoft.com/fwlink/p/?linkid=846105.\n\nIf you enable this policy setting, the Update Channel option is shown under File > Account. You need to select which update channels will be shown as options to the user.\n\nImportant:\n- Users must be a local administrator on the device to change to a different update channel.\n- Beta Channel is not a supported update channel. It should only be used in test environments and by a small group of select users, such as IT staff or application developers.\n\nIf you disable or don’t configure this policy setting, the Update Channel option is not shown under File > Account.\n\nNotes:\n- This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.\n- This policy setting takes precedence over the “Show the option for Microsoft 365 Insider” policy setting in cases where both policy settings are enabled.\n- If you enable this policy setting, you shouldn’t enable and configure the “Target Version”, “Update Channel”, or “Update Path” policy settings under Computer Configuration\\Policies\\Administrative Templates\\Microsoft Office 2016 (Machine)\\Updates. If you do, those policy settings will take precedence. The Update Channel option will still appear under File > Account, but it will be disabled and the user won’t be able to select an update channel.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\officechannelexposure","registrySubPath":"deferred","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UpdateChannelSelectorUser;L_UC_SAEPreview","uniqueId":2970,"displayName":"Semi-Annual Enterprise Channel (Preview)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls whether the Update Channel option is shown under File > Account in an app, such as Word. This option allows users to select which update channel they want to receive updates from.\n\nFor more information about update channels, see https://go.microsoft.com/fwlink/p/?linkid=846105.\n\nIf you enable this policy setting, the Update Channel option is shown under File > Account. You need to select which update channels will be shown as options to the user.\n\nImportant:\n- Users must be a local administrator on the device to change to a different update channel.\n- Beta Channel is not a supported update channel. It should only be used in test environments and by a small group of select users, such as IT staff or application developers.\n\nIf you disable or don’t configure this policy setting, the Update Channel option is not shown under File > Account.\n\nNotes:\n- This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.\n- This policy setting takes precedence over the “Show the option for Microsoft 365 Insider” policy setting in cases where both policy settings are enabled.\n- If you enable this policy setting, you shouldn’t enable and configure the “Target Version”, “Update Channel”, or “Update Path” policy settings under Computer Configuration\\Policies\\Administrative Templates\\Microsoft Office 2016 (Machine)\\Updates. If you do, those policy settings will take precedence. The Update Channel option will still appear under File > Account, but it will be disabled and the user won’t be able to select an update channel.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\officechannelexposure","registrySubPath":"firstreleasedeferred","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UpdateChannelSelectorUser","uniqueId":2972,"displayName":"Show the Update Channel option to allow users to select an update channel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UpdateChannelSelectorUser;L_UC_InsiderFast","logicalOperator":"exists","values":null},{"dependee":"office16;L_UpdateChannelSelectorUser;L_UC_InsiderSlow","logicalOperator":"exists","values":null},{"dependee":"office16;L_UpdateChannelSelectorUser;L_UC_Production","logicalOperator":"exists","values":null},{"dependee":"office16;L_UpdateChannelSelectorUser;L_UC_MEC","logicalOperator":"exists","values":null},{"dependee":"office16;L_UpdateChannelSelectorUser;L_UC_SAEPreview","logicalOperator":"exists","values":null},{"dependee":"office16;L_UpdateChannelSelectorUser;L_UC_SAE","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls whether the Update Channel option is shown under File > Account in an app, such as Word. This option allows users to select which update channel they want to receive updates from.\n\nFor more information about update channels, see https://go.microsoft.com/fwlink/p/?linkid=846105.\n\nIf you enable this policy setting, the Update Channel option is shown under File > Account. You need to select which update channels will be shown as options to the user.\n\nImportant:\n- Users must be a local administrator on the device to change to a different update channel.\n- Beta Channel is not a supported update channel. It should only be used in test environments and by a small group of select users, such as IT staff or application developers.\n\nIf you disable or don’t configure this policy setting, the Update Channel option is not shown under File > Account.\n\nNotes:\n- This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.\n- This policy setting takes precedence over the “Show the option for Microsoft 365 Insider” policy setting in cases where both policy settings are enabled.\n- If you enable this policy setting, you shouldn’t enable and configure the “Target Version”, “Update Channel”, or “Update Path” policy settings under Computer Configuration\\Policies\\Administrative Templates\\Microsoft Office 2016 (Machine)\\Updates. If you do, those policy settings will take precedence. The Update Channel option will still appear under File > Account, but it will be disabled and the user won’t be able to select an update channel.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"suppressofficechannelselector","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UpdateChannelSelectorUser_MSFTCC","uniqueId":5385,"displayName":"MSFTCC - Show the Update Channel option to allow users to select an update channel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_UpdateChannelSelectorUser;L_UC_InsiderFast","logicalOperator":"exists","values":[]},{"dependee":"office16;L_UpdateChannelSelectorUser;L_UC_InsiderSlow","logicalOperator":"exists","values":[]},{"dependee":"office16;L_UpdateChannelSelectorUser_MSFTCC;L_UC_MicrosoftCC","logicalOperator":"exists","values":[]}],"logicalOperator":1}}]},"dataType":"Composite"},"description":"This policy setting controls whether the Update Channel option is shown under File > Account in an app, such as Word. This option allows users to select which update channel they want to receive updates from.\n\nFor more information about update channels, see https://go.microsoft.com/fwlink/p/?linkid=846105.\n\nIf you enable this policy setting, the Update Channel option is shown under File > Account. You need to select which update channels will be shown as options to the user.\n\nImportant:\n- Users must be a local administrator on the device to change to a different update channel.\n- Beta Channel is not a supported update channel. It should only be used in test environments and by a small group of select users, such as IT staff or application developers.\n\nIf you disable or don’t configure this policy setting, the Update Channel option is not shown under File > Account.\n\nNotes:\n- This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.\n- This policy setting takes precedence over the “Show the option for Microsoft 365 Insider” policy setting in cases where both policy settings are enabled.\n- If you enable this policy setting, you shouldn’t enable and configure the “Target Version”, “Update Channel”, or “Update Path” policy settings under Computer Configuration\\Policies\\Administrative Templates\\Microsoft Office 2016 (Machine)\\Updates. If you do, those policy settings will take precedence. The Update Channel option will still appear under File > Account, but it will be disabled and the user won’t be able to select an update channel.","supportedPlatforms":["Windows"],"tags":["MSFTCC","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"suppressofficechannelselector","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UpdateChannelSelectorUser_MSFTCC;L_UC_MicrosoftCC","uniqueId":5386,"displayName":"Microsoft Current Channel (OuterRing)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls whether the Update Channel option is shown under File > Account in an app, such as Word. This option allows users to select which update channel they want to receive updates from.\n\nFor more information about update channels, see https://go.microsoft.com/fwlink/p/?linkid=846105.\n\nIf you enable this policy setting, the Update Channel option is shown under File > Account. You need to select which update channels will be shown as options to the user.\n\nImportant:\n- Users must be a local administrator on the device to change to a different update channel.\n- Beta Channel is not a supported update channel. It should only be used in test environments and by a small group of select users, such as IT staff or application developers.\n\nIf you disable or don’t configure this policy setting, the Update Channel option is not shown under File > Account.\n\nNotes:\n- This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.\n- This policy setting takes precedence over the “Show the option for Microsoft 365 Insider” policy setting in cases where both policy settings are enabled.\n- If you enable this policy setting, you shouldn’t enable and configure the “Target Version”, “Update Channel”, or “Update Path” policy settings under Computer Configuration\\Policies\\Administrative Templates\\Microsoft Office 2016 (Machine)\\Updates. If you do, those policy settings will take precedence. The Update Channel option will still appear under File > Account, but it will be disabled and the user won’t be able to select an update channel.","supportedPlatforms":["Windows"],"tags":["MSFTCC","Cloud Policies Boolean","Cloud Policies Composite","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\officechannelexposure","registrySubPath":"MicrosoftCurrentChannel","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Updatelinksonsave","uniqueId":1660,"displayName":"Update links on save","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Files","Tools | Options | General | Web Options...","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"donotupdatelinksonsave","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UpdateReliabilityPolicy","uniqueId":1698,"displayName":"Automatically receive small updates to improve reliability","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Microsoft Office Diagnostics is enabled. Office Diagnostics enables Microsoft to diagnose system problems by periodically downloading a small file to the computer. \n\nIf you enable this policy setting, Office Diagnostics collects information about specific errors and the IP address of the computer. Office Diagnostics does not transmit any personally identifiable information to Microsoft other than the IP address of the computer requesting the update. \n\nIf you disable this policy setting, users will not receive updates from Office Diagnostics. \n\nIf you do not configure this policy setting, this policy setting is not enabled, but users have the opportunity to opt into receiving updates from Office Diagnostics the first time they run an Office 2016 application.","supportedPlatforms":["Windows"],"tags":["Trust Center","Privacy","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"updatereliabilitydata","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UpperSorbian","uniqueId":2243,"displayName":"Upper Sorbian","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Upper Sorbian","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"hsb-de","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Urdu","uniqueId":2282,"displayName":"Urdu","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Urdu","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ur-pk","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_URLforlocationofdocumenttemplatesPolicy;L_EnteraURL","uniqueId":2487,"displayName":"Enter a URL","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Provide the path to a folder with document, spreadsheet, and presentation files to be used as templates for a unencrypted wrapper for files with rights-managed content received by users with older versions of Office. Office includes plain-text wrapper documents that notify users about a rights-managed document in certain circumstances. If the user's application cannot recognize a document that includes rights-management, the user receives the wrapper document with information such as instructions for downloading a Rights Management Add-on for Windows Internet Explorer. You can provide a folder with customized templates for Office to use for these plain-text wrappers by using this setting to specify a URL to a folder.","supportedPlatforms":["Windows"],"tags":["Manage Restricted Permissions","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\drm","registrySubPath":"downleveltemplatepath","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_URLforlocationofdocumenttemplatesPolicy","uniqueId":2488,"displayName":"URL for location of document templates displayed when applications do not recognize rights-managed documents","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_URLforlocationofdocumenttemplatesPolicy;L_EnteraURL","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Provide the path to a folder with document, spreadsheet, and presentation files to be used as templates for a unencrypted wrapper for files with rights-managed content received by users with older versions of Office. Office includes plain-text wrapper documents that notify users about a rights-managed document in certain circumstances. If the user's application cannot recognize a document that includes rights-management, the user receives the wrapper document with information such as instructions for downloading a Rights Management Add-on for Windows Internet Explorer. You can provide a folder with customized templates for Office to use for these plain-text wrappers by using this setting to specify a URL to a folder.","supportedPlatforms":["Windows"],"tags":["Manage Restricted Permissions","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Useautochangelist","uniqueId":1688,"displayName":"Use auto-change list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the option \"Search misused word list\". This option is available only if you are using the Korean language version of Microsoft Office or have installed Microsoft Office 2016 proofing tools or the Microsoft Office Single Language Pack 2016 for Korean, and have enabled support for Korean through Microsoft Office 2016 Language Preferences.","supportedPlatforms":["Windows"],"tags":["Tools | Options | Spelling","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpref","registrySubPath":"fsplmissearch_561_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UseGermanpostreformruleswhenrunningspellcheck","uniqueId":1686,"displayName":"German: Use post-reform rules","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Allows users to choose a particular spellchecking style; Pre-reform or post reform.","supportedPlatforms":["Windows"],"tags":["Tools | Options | Spelling","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\shared tools\\proofing tools\\spelling","registrySubPath":"germanpostreform","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UseLegacyTranslationFeatures","uniqueId":2923,"displayName":"Use legacy translation features","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to use legacy translation features in Office apps, such as Word, instead of the Translator feature, which uses the cloud-based Microsoft Translator service.\n\nLegacy translation features include the following:\n- Translation of the entire document, by using the browser-based Bilingual Viewer.\n- Translation of selected text, by using the Research pane.\n- Translation of an individual word when hovering over the word, by using the Mini Translator.\n\nYou may need to use legacy translation features in special cases that require extra configurability, such as when using customer translation providers.\n\nIf you enable this policy setting, translation commands, such as those on the ribbon or in shortcut menus, will use the legacy translation features instead of the Translator feature.\n\nIf you disable or don’t configure this policy setting, translation commands, such as those on the ribbon or in shortcut menus, will use the Translator feature instead of the legacy translation features.\n\nNote: This policy setting only applies to apps and subscription versions of Office, such as Microsoft 365 Apps for enterprise, that support the Translator feature.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common","registrySubPath":"uselegacytranslationfeatures","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UseLocalUserInfo","uniqueId":2884,"displayName":"Use local user name and initials values regardless of signed-in user","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Office uses the user name and initials of the user currently signed-in, or the user name and initials that are specified in the Options dialog box.\n\nIf you enable this policy setting, regardless of any user currently signed-in, Office uses the user name and initials specified in the Options dialog box.\n\nIf you disable or do not configure this policy setting, Office uses the user name and initials from the information provided by the user that is currently signed-in.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\userinfo","registrySubPath":"uselocal","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Uselongfilenameswheneverpossible","uniqueId":1659,"displayName":"Use long file names whenever possible","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Files","Tools | Options | General | Web Options...","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"donotuselongfilenames","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UseOfficeForLabelling","uniqueId":2953,"displayName":"Use the Sensitivity feature in Office to apply and view sensitivity labels","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether sensitivity labels configured by an admin can be applied and viewed by using sensitivity labels in an Office app, such as Word. It applies only to subscription versions of Office, such as Microsoft 365 Apps for enterprise.​\n\nThis setting has been updated for newer versions of M365 Apps. For more information about this setting and how it applies to versions of M365 Apps, see https://go.microsoft.com/fwlink/p/?linkid=2207430. ​\n\nFor newer versions of M365 Apps:​\n\nIf you enable this policy setting, or don’t configure this policy setting, sensitivity labels that are built into Office apps can be used to apply and view sensitivity labels.\n\nIf you disable this policy setting, sensitivity labels that are built into Office apps can’t be used to apply or view sensitivity labels. If the Microsoft Azure Information Protection unified labeling client is installed and you want to use the add-in from that client for labeling, you must also configure the policy setting \"Use the Azure Information Protection add-in for sensitivity labeling\".​\n\nFor prior versions:​\n\nIf you enable this policy setting, labels built into Office apps can be used to apply and view sensitivity labels. If the Microsoft Azure Information Protection unified labeling client is installed, we also recommend you block that client’s add-in from loading in Word, Excel, PowerPoint, and Outlook.\n\nIf you disable this policy setting, or don’t configure this policy setting, labels built into Office apps can’t be used to apply and view sensitivity labels. If the Microsoft Azure Information Protection unified labeling client is installed, the add-in from that client can be used to apply and view sensitivity labels in Office apps.","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security\\labels","registrySubPath":"useofficeforlabelling","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Userqueriespath","uniqueId":2032,"displayName":"User queries path","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Userqueriespath;L_userqueriespath331","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the location of data sources for database queries.","supportedPlatforms":["Windows"],"tags":["Shared paths","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Userqueriespath;L_userqueriespath331","uniqueId":2031,"displayName":"User queries path","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specifies the location of data sources for database queries.","supportedPlatforms":["Windows"],"tags":["Shared paths","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"userqueriesfolder","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_Usertemplatespath","uniqueId":2024,"displayName":"User templates path","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Usertemplatespath;L_usertemplatespath328","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the location of user templates.","supportedPlatforms":["Windows"],"tags":["Shared paths","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Usertemplatespath;L_usertemplatespath328","uniqueId":2023,"displayName":"User templates path","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specifies the location of user templates.","supportedPlatforms":["Windows"],"tags":["Shared paths","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"usertemplates","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_UsesystemfontinsteadofTahoma","uniqueId":2711,"displayName":"Use system font instead of the Office default UI font","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Use the system font instead of the Office default UI font. | Unchecked: Use the Office default UI font.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"useofficeuifont","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UyghurPRC","uniqueId":2280,"displayName":"Uyghur (China)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Uyghur (China)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ug-cn","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UzbekCyrillic","uniqueId":2283,"displayName":"Uzbek (Cyrillic)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Uzbek (Cyrillic)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"uz-cyrl-uz","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_UzbekLatin","uniqueId":2284,"displayName":"Uzbek (Latin)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Uzbek (Latin)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"uz-latn-uz","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Valencian","uniqueId":2285,"displayName":"Valencian","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Valencian","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ca-es-valencia","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_VBADigSigChainTrustedPublishers","uniqueId":2929,"displayName":"Allow root or intermediate certificates as VBA trusted publishers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether root and intermediate certificates can be added as trusted publishers for VBA macro validation when the VBA Macro Notification Settings policy is set to \"Disable all except digitally signed macros\".\n\nIf you enable this policy setting, administrators can add root or intermediate certificates to the trusted publishers store. VBA macros signed by any certificate that chains to these trusted root or intermediate certificates will be considered as signed by a trusted publisher and allowed to run.\n\nIf you disable or don't configure this policy setting, only end (leaf) certificates can be added as trusted publishers.\n\nNote: This policy setting only takes effect when the VBA Macro Notification Settings policy is set to \"Disable all except digitally signed macros\".","supportedPlatforms":["Windows"],"tags":["Security Settings","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\security","registrySubPath":"vbadigsigchaintrustedpublishers","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Venda","uniqueId":2286,"displayName":"Venda","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Venda","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ve-za","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Vietnamese","uniqueId":2287,"displayName":"Vietnamese","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Vietnamese","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"vi-vn","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WACSideloadAddins","uniqueId":5387,"displayName":"Allow users to sideload their Add-ins to Office on the web through Office Add-ins dialog page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether users can sideload their own Add-ins in Excel, OneNote, PowerPoint, or Word on the Web via the Office Add-ins dialog page. By default, users are permitted to sideload their own Add-ins to Office on the web for testing purposes without the need for an initial add-in catalog inclusion. A detailed overview of this experience can be found at https://learn.microsoft.com/en-us/office/dev/add-ins/testing/sideload-office-add-ins-for-testing. The primary function this policy affects is the \"Upload My Add-in\" feature on the Office Add-ins dialog page.\n\nIf you enable this policy setting, users will have the capability to sideload their own Add-ins by manually uploading these Add-ins to Office on the web using the \"Upload My Add-in\" feature.\n\nBy disabling this policy setting, users will be restricted from sideloading their own Add-ins by manually uploading them to Office on the web via the \"Upload My Add-in\" feature.\n\nIf you do not set the policy setting it will be treated as enabled, and users will be allowed to sideload their own Add-ins by manually uploading these Add-ins to Office on the web using the \"Upload My Add-in\" feature.\n\nNote: This policy will not affect the ability of users to sideload a Yeoman-created add-in through the developer catalog.","supportedPlatforms":["Web"],"tags":["Office Add-ins","WACSideloading","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\wac","registrySubPath":"WACSideloadAddins","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WebArchiveencoding","uniqueId":2463,"displayName":"Web Archive encoding","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WebArchiveencoding;L_webarchiveencoding402","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\"Use 8 bit content-transfer-encoding\": Use a content-transfer-encoding of 8bit for all parts in a Web Archive file. | \"Use 8 bit only for encoding text parts\": Use a content-transfer-encoding of 8bit only for text parts. | \"Use RFC-approved encoding\": Always use RFC-approved encodings.","supportedPlatforms":["Windows"],"tags":["Web Archives","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WebArchiveencoding;L_webarchiveencoding402","uniqueId":2462,"displayName":"Web Archive encoding","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use 8 bit content-transfer-encoding","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use 8 bit only for encoding text parts","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use RFC-approved encoding","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":2,"description":"\"Use 8 bit content-transfer-encoding\": Use a content-transfer-encoding of 8bit for all parts in a Web Archive file. | \"Use 8 bit only for encoding text parts\": Use a content-transfer-encoding of 8bit only for text parts. | \"Use RFC-approved encoding\": Always use RFC-approved encodings.","supportedPlatforms":["Windows"],"tags":["Web Archives","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"allow8bitmime","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WebFoldersManagingpairsofWebpagesandfolders","uniqueId":2719,"displayName":"Web Folders: Managing pairs of Web pages and folders","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WebFoldersManagingpairsofWebpagesandfolders;L_webfoldersmanagingpairsofwebpagesandfolders506","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies how a Web page and folder pair is to be displayed and managed by Windows.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WebFoldersManagingpairsofWebpagesandfolders;L_webfoldersmanagingpairsofwebpagesandfolders506","uniqueId":2718,"displayName":"Web Folders: Managing pairs of Web pages and folders","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Show and manage the pair as a single file","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Show both parts and manage them individually","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Show both parts but manage as a single file","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Specifies how a Web page and folder pair is to be displayed and managed by Windows.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\windows\\currentversion\\explorer","registrySubPath":"nofilefolderconnection","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WebQuerydialoghomepage","uniqueId":2034,"displayName":"Web Query dialog box home page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WebQuerydialoghomepage;L_webquerydialoghomepage333","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the default location of the home page for Web queries.","supportedPlatforms":["Windows"],"tags":["Shared paths","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WebQuerydialoghomepage;L_webquerydialoghomepage333","uniqueId":2033,"displayName":"Web Query dialog box home page","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specifies the default location of the home page for Web queries.","supportedPlatforms":["Windows"],"tags":["Shared paths","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\excel\\options","registrySubPath":"webqueryhomepage","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_WebServiceDefaultSizeLimit","uniqueId":2593,"displayName":"Set web service default return size limit","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WebServiceDefaultSizeLimit;L_WebServiceDefaultSizeLimitDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the default limit of how much data in kilobytes (KB) the web service shim can return per call. The application is allowed to specify a larger limit programmatically.\n\nIf you enable this policy setting, you may specify the default limit of data in kilobytes the web service shim can return per call.\n\nIf you disable or do not configure this policy setting, a default limit of 3000 KB will be used.","supportedPlatforms":["Windows"],"tags":["Web Service","Business Data","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WebServiceDefaultSizeLimit;L_WebServiceDefaultSizeLimitDecimal","uniqueId":2592,"displayName":"Web service default size limit (KB)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":1000000000},"dataType":"Integer"},"description":"This policy setting allows you to specify the default limit of how much data in kilobytes (KB) the web service shim can return per call. The application is allowed to specify a larger limit programmatically.\n\nIf you enable this policy setting, you may specify the default limit of data in kilobytes the web service shim can return per call.\n\nIf you disable or do not configure this policy setting, a default limit of 3000 KB will be used.","supportedPlatforms":["Windows"],"tags":["Web Service","Business Data","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\business data\\limits\\wcf\\size","registrySubPath":"default","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WebServiceDefaultTimeout","uniqueId":2589,"displayName":"Set web service default timeout","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WebServiceDefaultTimeout;L_WebServiceDefaultTimeoutDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the default timeout in milliseconds for the web service shim. The application is allowed to specify a larger timeout programmatically.\n\nIf you enable this policy setting, you may specify the default timeout in milliseconds for the web service shim.\n\nIf you disable or do not configure this policy setting, a default of 7000 milliseconds will be used.","supportedPlatforms":["Windows"],"tags":["Web Service","Business Data","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WebServiceDefaultTimeout;L_WebServiceDefaultTimeoutDecimal","uniqueId":2588,"displayName":"Web service default timeout limit (milliseconds)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":75000000},"dataType":"Integer"},"description":"This policy setting allows you to specify the default timeout in milliseconds for the web service shim. The application is allowed to specify a larger timeout programmatically.\n\nIf you enable this policy setting, you may specify the default timeout in milliseconds for the web service shim.\n\nIf you disable or do not configure this policy setting, a default of 7000 milliseconds will be used.","supportedPlatforms":["Windows"],"tags":["Web Service","Business Data","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\business data\\limits\\wcf\\timeout","registrySubPath":"default","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WebServiceMaxSizeLimit","uniqueId":2595,"displayName":"Set maximum web service return size limit","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WebServiceMaxSizeLimit;L_WebServiceMaxSizeLimitDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the maximum  limit of how much data in kilobytes (KB) the web service shim can return per call.  This maximum value is enforced for applications including those that do not respect the default.  \n\nIf you enable this policy setting, you may specify the maximum limit of data in kilobytes the web service shim can return per call.\n\nIf you disable or do not configure this policy setting, no maximum limit will be enforced.","supportedPlatforms":["Windows"],"tags":["Web Service","Business Data","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WebServiceMaxSizeLimit;L_WebServiceMaxSizeLimitDecimal","uniqueId":2594,"displayName":"Web service maximum size limit (KB)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":1000000000},"dataType":"Integer"},"description":"This policy setting allows you to specify the maximum  limit of how much data in kilobytes (KB) the web service shim can return per call.  This maximum value is enforced for applications including those that do not respect the default.  \n\nIf you enable this policy setting, you may specify the maximum limit of data in kilobytes the web service shim can return per call.\n\nIf you disable or do not configure this policy setting, no maximum limit will be enforced.","supportedPlatforms":["Windows"],"tags":["Web Service","Business Data","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\business data\\limits\\wcf\\size","registrySubPath":"max","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WebServiceMaxTimeout","uniqueId":2591,"displayName":"Set maximum web service default timeout","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WebServiceMaxTimeout;L_WebServiceMaxTimeoutDecimal","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the maximum timeout in milliseconds for the web service shim.  This maximum value is enforced for applications that do not respect the default.\n\nIf you enable this policy setting, you may specify the maximum timeout in milliseconds for the web service shim.\n\nIf you disable or do not configure this policy setting, no maximum limit will be enforced.","supportedPlatforms":["Windows"],"tags":["Web Service","Business Data","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WebServiceMaxTimeout;L_WebServiceMaxTimeoutDecimal","uniqueId":2590,"displayName":"Web service maximum timeout limit (milliseconds)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":75000000},"dataType":"Integer"},"description":"This policy setting allows you to specify the maximum timeout in milliseconds for the web service shim.  This maximum value is enforced for applications that do not respect the default.\n\nIf you enable this policy setting, you may specify the maximum timeout in milliseconds for the web service shim.\n\nIf you disable or do not configure this policy setting, no maximum limit will be enforced.","supportedPlatforms":["Windows"],"tags":["Web Service","Business Data","Microsoft Office 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\business data\\limits\\wcf\\timeout","registrySubPath":"max","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WebVertical","uniqueId":5388,"displayName":"Allow users to access web results in Office.com and SharePoint online","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether your users can see web results along with results from your organization when they search on Office.com or SharePoint. In the future, Microsoft may release this feature for other Office applications. Microsoft will respect this policy for future promotions.\n\nThe ability to view web results is enabled by default. If you don’t configure this policy setting, users will see a separate vertical containing web results in their enterprise search result pages. Users can choose to navigate to this vertical to view web results.\n\nIf you disable this policy setting, the separate vertical and web results don’t appear when users search on Office.com or SharePoint.\n\nNote: This policy setting only applies to subscription versions of Office 365 or Microsoft 365, such as Microsoft 365 Apps for enterprise, that include Microsoft Search.","supportedPlatforms":["Web"],"tags":["WebVertical","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\webvertical","registrySubPath":"WebVertical","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Welsh","uniqueId":2288,"displayName":"Welsh","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Welsh","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"cy-gb","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WhenchoosingSendforReview;L_empty392","uniqueId":2448,"displayName":"When choosing 'Send for Review...'","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Send link and attachment","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Only send link","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt user","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":2,"description":"\"Send link and attachment\": When choosing Send for Review for a document on a server, send both a link and an attachment. | \"Only send link\": When choosing Send for Review for a document on a server, send only a link. | \"Prompt user\": When choosing Send for Review for a document on a server, prompt the user for what to send.","supportedPlatforms":["Windows"],"tags":["Collaboration Settings","Microsoft Office 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"reviewinglinks","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WhenchoosingSendforReview","uniqueId":2449,"displayName":"When choosing 'Send for Review...'","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WhenchoosingSendforReview;L_empty392","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\"Send link and attachment\": When choosing Send for Review for a document on a server, send both a link and an attachment. | \"Only send link\": When choosing Send for Review for a document on a server, send only a link. | \"Prompt user\": When choosing Send for Review for a document on a server, prompt the user for what to send.","supportedPlatforms":["Windows"],"tags":["Collaboration Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Withalinkandanattachment","uniqueId":2427,"displayName":"With a link and an attachment","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Withalinkandanattachment;L_withalinkandanattachment359","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines the default message body text used in an email request for review when the review document is included only as an attachment.","supportedPlatforms":["Windows"],"tags":["Default message text for a review request...","Collaboration Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Withalinkandanattachment;L_withalinkandanattachment359","uniqueId":2426,"displayName":"With a link and an attachment","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Defines the default message body text used in an email request for review when the review document is included only as an attachment.","supportedPlatforms":["Windows"],"tags":["Default message text for a review request...","Collaboration Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\reviewcycle","registrySubPath":"linkplusattachmentbody","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_withasimplewebdiscussionslink373","uniqueId":2437,"displayName":"With a simple Web discussions link","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_withasimplewebdiscussionslink373;L_withasimplewebdiscussionslink374","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines the default message body text used in a reply to an email request for review when the reply contains a simple Web discussions link.  ","supportedPlatforms":["Windows"],"tags":["Default message text for a reply...","Collaboration Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_withasimplewebdiscussionslink373;L_withasimplewebdiscussionslink374","uniqueId":2436,"displayName":"With a simple Web discussions link","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Defines the default message body text used in a reply to an email request for review when the reply contains a simple Web discussions link.  ","supportedPlatforms":["Windows"],"tags":["Default message text for a reply...","Collaboration Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\reviewcycle","registrySubPath":"linkplussimplediscussionsreply","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WithasimpleWebdiscussionslinkandanattachment","uniqueId":2431,"displayName":"With a simple Web discussions link and an attachment","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WithasimpleWebdiscussionslinkandanattachment;L_withasimplewebdiscussionslinkandanattachment364","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines the default message body text used in an email request for review when the review document is included only as an attachment.","supportedPlatforms":["Windows"],"tags":["Default message text for a review request...","Collaboration Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WithasimpleWebdiscussionslinkandanattachment;L_withasimplewebdiscussionslinkandanattachment364","uniqueId":2430,"displayName":"With a simple Web discussions link and an attachment","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Defines the default message body text used in an email request for review when the review document is included only as an attachment.","supportedPlatforms":["Windows"],"tags":["Default message text for a review request...","Collaboration Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\reviewcycle","registrySubPath":"linkplussimplediscussionsplusattachmentbody","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WithasimpleWebdiscussionslink","uniqueId":2429,"displayName":"With a simple Web discussions link","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WithasimpleWebdiscussionslink;L_withasimplewebdiscussionslink362","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines the default message body text used in an email request for review when the review document is included only as an attachment.","supportedPlatforms":["Windows"],"tags":["Default message text for a review request...","Collaboration Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WithasimpleWebdiscussionslink;L_withasimplewebdiscussionslink362","uniqueId":2428,"displayName":"With a simple Web discussions link","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Defines the default message body text used in an email request for review when the review document is included only as an attachment.","supportedPlatforms":["Windows"],"tags":["Default message text for a review request...","Collaboration Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\reviewcycle","registrySubPath":"linkplussimplediscussionsbody","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_withawebdiscussionslink380","uniqueId":2443,"displayName":"With a Web discussions link","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_withawebdiscussionslink380;L_withawebdiscussionslink381","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines the default message body text used in a reply to an email request for review when the reply contains a simple Web discussions link.  ","supportedPlatforms":["Windows"],"tags":["Default message text for a reply...","Collaboration Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_withawebdiscussionslink380;L_withawebdiscussionslink381","uniqueId":2442,"displayName":"With a Web discussions link","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Defines the default message body text used in a reply to an email request for review when the reply contains a simple Web discussions link.  ","supportedPlatforms":["Windows"],"tags":["Default message text for a reply...","Collaboration Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\reviewcycle","registrySubPath":"linkplusdiscussionsreply","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WithaWebdiscussionslinkandanattachment","uniqueId":2435,"displayName":"With a Web discussions link and an attachment","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WithaWebdiscussionslinkandanattachment;L_withawebdiscussionslinkandanattachment370","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines the default message body text used in an email request for review when the review document is included only as an attachment.","supportedPlatforms":["Windows"],"tags":["Default message text for a review request...","Collaboration Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WithaWebdiscussionslinkandanattachment;L_withawebdiscussionslinkandanattachment370","uniqueId":2434,"displayName":"With a Web discussions link and an attachment","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Defines the default message body text used in an email request for review when the review document is included only as an attachment.","supportedPlatforms":["Windows"],"tags":["Default message text for a review request...","Collaboration Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\reviewcycle","registrySubPath":"linkplusdiscussionsplusattachmentbody","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WithaWebdiscussionslink","uniqueId":2433,"displayName":"With a Web discussions link","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WithaWebdiscussionslink;L_withawebdiscussionslink367","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines the default message body text used in an email request for review when the review document is included only as an attachment.","supportedPlatforms":["Windows"],"tags":["Default message text for a review request...","Collaboration Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WithaWebdiscussionslink;L_withawebdiscussionslink367","uniqueId":2432,"displayName":"With a Web discussions link","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Defines the default message body text used in an email request for review when the review document is included only as an attachment.","supportedPlatforms":["Windows"],"tags":["Default message text for a review request...","Collaboration Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\reviewcycle","registrySubPath":"linkplusdiscussionsbody","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_Withjustanattachment","uniqueId":2441,"displayName":"With just an attachment","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Withjustanattachment;L_withjustanattachment379","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines the default message body text used in a reply to an email request for review when the reply contains a simple Web discussions link.  ","supportedPlatforms":["Windows"],"tags":["Default message text for a reply...","Collaboration Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Withjustanattachment;L_withjustanattachment379","uniqueId":2440,"displayName":"With just an attachment","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Defines the default message body text used in a reply to an email request for review when the reply contains a simple Web discussions link.  ","supportedPlatforms":["Windows"],"tags":["Default message text for a reply...","Collaboration Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\reviewcycle","registrySubPath":"attachmentreply","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WithjustasimpleWebdiscussionslink","uniqueId":2439,"displayName":"With just a simple Web discussions link","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WithjustasimpleWebdiscussionslink;L_withjustasimplewebdiscussionslink377","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines the default message body text used in a reply to an email request for review when the reply contains a simple Web discussions link.  ","supportedPlatforms":["Windows"],"tags":["Default message text for a reply...","Collaboration Settings","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WithjustasimpleWebdiscussionslink;L_withjustasimplewebdiscussionslink377","uniqueId":2438,"displayName":"With just a simple Web discussions link","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Defines the default message body text used in a reply to an email request for review when the reply contains a simple Web discussions link.  ","supportedPlatforms":["Windows"],"tags":["Default message text for a reply...","Collaboration Settings","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\reviewcycle","registrySubPath":"linkreply","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_Wolof","uniqueId":2289,"displayName":"Wolof","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Wolof","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"wo-sn","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache10","uniqueId":2666,"displayName":"Workflow Cache 10","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WorkflowCache10;L_workflowcachename473","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache10;L_workflowpath474","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache10;L_workflowdescrip475","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache10;L_workflowfriendly476","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache10;L_workflowsig477","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WorkflowCache10;L_workflowcachename473","uniqueId":2661,"displayName":"Name of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow10","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache10;L_workflowdescrip475","uniqueId":2663,"displayName":"Description of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow10","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache10;L_workflowfriendly476","uniqueId":2664,"displayName":"Name of the document library to be shown the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow10","registrySubPath":"documentlibraryfriendlyname","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache10;L_workflowpath474","uniqueId":2662,"displayName":"Full URL to the document library with which the workflow is associated","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow10","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache10;L_workflowsig477","uniqueId":2665,"displayName":"Workflow requires the user to sign the document (Word/Excel only)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow10","registrySubPath":"sigclientrequired","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache11","uniqueId":2672,"displayName":"Workflow Cache 11","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WorkflowCache11;L_workflowcachename478","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache11;L_workflowpath479","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache11;L_workflowdescrip480","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache11;L_workflowfriendly481","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache11;L_workflowsig482","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WorkflowCache11;L_workflowcachename478","uniqueId":2667,"displayName":"Name of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow11","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache11;L_workflowdescrip480","uniqueId":2669,"displayName":"Description of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow11","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache11;L_workflowfriendly481","uniqueId":2670,"displayName":"Name of the document library to be shown the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow11","registrySubPath":"documentlibraryfriendlyname","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache11;L_workflowpath479","uniqueId":2668,"displayName":"Full URL to the document library with which the workflow is associated","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow11","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache11;L_workflowsig482","uniqueId":2671,"displayName":"Workflow requires the user to sign the document (Word/Excel only)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow11","registrySubPath":"sigclientrequired","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache12","uniqueId":2678,"displayName":"Workflow Cache 12","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WorkflowCache12;L_workflowcachename483","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache12;L_workflowpath484","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache12;L_workflowdescrip485","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache12;L_workflowfriendly486","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache12;L_workflowsig487","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WorkflowCache12;L_workflowcachename483","uniqueId":2673,"displayName":"Name of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow12","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache12;L_workflowdescrip485","uniqueId":2675,"displayName":"Description of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow12","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache12;L_workflowfriendly486","uniqueId":2676,"displayName":"Name of the document library to be shown the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow12","registrySubPath":"documentlibraryfriendlyname","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache12;L_workflowpath484","uniqueId":2674,"displayName":"Full URL to the document library with which the workflow is associated","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow12","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache12;L_workflowsig487","uniqueId":2677,"displayName":"Workflow requires the user to sign the document (Word/Excel only)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow12","registrySubPath":"sigclientrequired","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache13","uniqueId":2684,"displayName":"Workflow Cache 13","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WorkflowCache13;L_workflowcachename488","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache13;L_workflowpath489","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache13;L_workflowdescrip490","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache13;L_workflowfriendly491","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache13;L_workflowsig492","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WorkflowCache13;L_workflowcachename488","uniqueId":2679,"displayName":"Name of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow13","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache13;L_workflowdescrip490","uniqueId":2681,"displayName":"Description of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow13","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache13;L_workflowfriendly491","uniqueId":2682,"displayName":"Name of the document library to be shown the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow13","registrySubPath":"documentlibraryfriendlyname","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache13;L_workflowpath489","uniqueId":2680,"displayName":"Full URL to the document library with which the workflow is associated","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow13","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache13;L_workflowsig492","uniqueId":2683,"displayName":"Workflow requires the user to sign the document (Word/Excel only)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow13","registrySubPath":"sigclientrequired","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache14","uniqueId":2690,"displayName":"Workflow Cache 14","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WorkflowCache14;L_workflowcachename493","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache14;L_workflowpath494","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache14;L_workflowdescrip495","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache14;L_workflowfriendly496","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache14;L_workflowsig497","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WorkflowCache14;L_workflowcachename493","uniqueId":2685,"displayName":"Name of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow14","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache14;L_workflowdescrip495","uniqueId":2687,"displayName":"Description of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow14","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache14;L_workflowfriendly496","uniqueId":2688,"displayName":"Name of the document library to be shown the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow14","registrySubPath":"documentlibraryfriendlyname","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache14;L_workflowpath494","uniqueId":2686,"displayName":"Full URL to the document library with which the workflow is associated","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow14","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache14;L_workflowsig497","uniqueId":2689,"displayName":"Workflow requires the user to sign the document (Word/Excel only)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow14","registrySubPath":"sigclientrequired","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache15","uniqueId":2696,"displayName":"Workflow Cache 15","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WorkflowCache15;L_workflowcachename498","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache15;L_workflowpath499","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache15;L_workflowdescrip500","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache15;L_workflowfriendly501","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache15;L_workflowsig502","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WorkflowCache15;L_workflowcachename498","uniqueId":2691,"displayName":"Name of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow15","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache15;L_workflowdescrip500","uniqueId":2693,"displayName":"Description of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow15","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache15;L_workflowfriendly501","uniqueId":2694,"displayName":"Name of the document library to be shown the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow15","registrySubPath":"documentlibraryfriendlyname","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache15;L_workflowpath499","uniqueId":2692,"displayName":"Full URL to the document library with which the workflow is associated","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow15","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache15;L_workflowsig502","uniqueId":2695,"displayName":"Workflow requires the user to sign the document (Word/Excel only)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow15","registrySubPath":"sigclientrequired","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache1","uniqueId":2612,"displayName":"Workflow Cache 1","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WorkflowCache1;L_WorkflowCacheName","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache1;L_WorkflowPath","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache1;L_WorkflowDescrip","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache1;L_WorkflowFriendly","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache1;L_WorkFlowSig","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WorkflowCache1;L_WorkflowCacheName","uniqueId":2607,"displayName":"Name of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow1","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache1;L_WorkflowDescrip","uniqueId":2609,"displayName":"Description of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow1","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache1;L_WorkflowFriendly","uniqueId":2610,"displayName":"Name of the document library to be shown the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow1","registrySubPath":"documentlibraryfriendlyname","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache1;L_WorkflowPath","uniqueId":2608,"displayName":"Full URL to the document library with which the workflow is associated","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow1","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache1;L_WorkFlowSig","uniqueId":2611,"displayName":"Workflow requires the user to sign the document (Word/Excel only)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow1","registrySubPath":"sigclientrequired","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache2","uniqueId":2618,"displayName":"Workflow Cache 2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WorkflowCache2;L_workflowcachename433","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache2;L_workflowpath434","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache2;L_workflowdescrip435","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache2;L_workflowfriendly436","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache2;L_workflowsig437","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WorkflowCache2;L_workflowcachename433","uniqueId":2613,"displayName":"Name of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow2","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache2;L_workflowdescrip435","uniqueId":2615,"displayName":"Description of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow2","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache2;L_workflowfriendly436","uniqueId":2616,"displayName":"Name of the document library to be shown the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow2","registrySubPath":"documentlibraryfriendlyname","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache2;L_workflowpath434","uniqueId":2614,"displayName":"Full URL to the document library with which the workflow is associated","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow2","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache2;L_workflowsig437","uniqueId":2617,"displayName":"Workflow requires the user to sign the document (Word/Excel only)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow2","registrySubPath":"sigclientrequired","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache3","uniqueId":2624,"displayName":"Workflow Cache 3","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WorkflowCache3;L_workflowcachename438","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache3;L_workflowpath439","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache3;L_workflowdescrip440","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache3;L_workflowfriendly441","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache3;L_workflowsig442","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WorkflowCache3;L_workflowcachename438","uniqueId":2619,"displayName":"Name of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow3","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache3;L_workflowdescrip440","uniqueId":2621,"displayName":"Description of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow3","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache3;L_workflowfriendly441","uniqueId":2622,"displayName":"Name of the document library to be shown the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow3","registrySubPath":"documentlibraryfriendlyname","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache3;L_workflowpath439","uniqueId":2620,"displayName":"Full URL to the document library with which the workflow is associated","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow3","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache3;L_workflowsig442","uniqueId":2623,"displayName":"Workflow requires the user to sign the document (Word/Excel only)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow3","registrySubPath":"sigclientrequired","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache4","uniqueId":2630,"displayName":"Workflow Cache 4","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WorkflowCache4;L_workflowcachename443","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache4;L_workflowpath444","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache4;L_workflowdescrip445","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache4;L_workflowfriendly446","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache4;L_workflowsig447","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WorkflowCache4;L_workflowcachename443","uniqueId":2625,"displayName":"Name of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow4","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache4;L_workflowdescrip445","uniqueId":2627,"displayName":"Description of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow4","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache4;L_workflowfriendly446","uniqueId":2628,"displayName":"Name of the document library to be shown the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow4","registrySubPath":"documentlibraryfriendlyname","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache4;L_workflowpath444","uniqueId":2626,"displayName":"Full URL to the document library with which the workflow is associated","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow4","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache4;L_workflowsig447","uniqueId":2629,"displayName":"Workflow requires the user to sign the document (Word/Excel only)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow4","registrySubPath":"sigclientrequired","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache5","uniqueId":2636,"displayName":"Workflow Cache 5","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WorkflowCache5;L_workflowcachename448","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache5;L_workflowpath449","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache5;L_workflowdescrip450","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache5;L_workflowfriendly451","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache5;L_workflowsig452","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WorkflowCache5;L_workflowcachename448","uniqueId":2631,"displayName":"Name of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow5","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache5;L_workflowdescrip450","uniqueId":2633,"displayName":"Description of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow5","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache5;L_workflowfriendly451","uniqueId":2634,"displayName":"Name of the document library to be shown the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow5","registrySubPath":"documentlibraryfriendlyname","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache5;L_workflowpath449","uniqueId":2632,"displayName":"Full URL to the document library with which the workflow is associated","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow5","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache5;L_workflowsig452","uniqueId":2635,"displayName":"Workflow requires the user to sign the document (Word/Excel only)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow5","registrySubPath":"sigclientrequired","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache6","uniqueId":2642,"displayName":"Workflow Cache 6","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WorkflowCache6;L_workflowcachename453","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache6;L_workflowpath454","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache6;L_workflowdescrip455","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache6;L_workflowfriendly456","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache6;L_workflowsig457","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WorkflowCache6;L_workflowcachename453","uniqueId":2637,"displayName":"Name of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow6","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache6;L_workflowdescrip455","uniqueId":2639,"displayName":"Description of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow6","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache6;L_workflowfriendly456","uniqueId":2640,"displayName":"Name of the document library to be shown the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow6","registrySubPath":"documentlibraryfriendlyname","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache6;L_workflowpath454","uniqueId":2638,"displayName":"Full URL to the document library with which the workflow is associated","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow6","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache6;L_workflowsig457","uniqueId":2641,"displayName":"Workflow requires the user to sign the document (Word/Excel only)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow6","registrySubPath":"sigclientrequired","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache7","uniqueId":2648,"displayName":"Workflow Cache 7","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WorkflowCache7;L_workflowcachename458","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache7;L_workflowpath459","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache7;L_workflowdescrip460","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache7;L_workflowfriendly461","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache7;L_workflowsig462","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WorkflowCache7;L_workflowcachename458","uniqueId":2643,"displayName":"Name of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow7","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache7;L_workflowdescrip460","uniqueId":2645,"displayName":"Description of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow7","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache7;L_workflowfriendly461","uniqueId":2646,"displayName":"Name of the document library to be shown the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow7","registrySubPath":"documentlibraryfriendlyname","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache7;L_workflowpath459","uniqueId":2644,"displayName":"Full URL to the document library with which the workflow is associated","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow7","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache7;L_workflowsig462","uniqueId":2647,"displayName":"Workflow requires the user to sign the document (Word/Excel only)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow7","registrySubPath":"sigclientrequired","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache8","uniqueId":2654,"displayName":"Workflow Cache 8","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WorkflowCache8;L_workflowcachename463","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache8;L_workflowpath464","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache8;L_workflowdescrip465","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache8;L_workflowfriendly466","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache8;L_workflowsig467","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WorkflowCache8;L_workflowcachename463","uniqueId":2649,"displayName":"Name of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow8","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache8;L_workflowdescrip465","uniqueId":2651,"displayName":"Description of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow8","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache8;L_workflowfriendly466","uniqueId":2652,"displayName":"Name of the document library to be shown the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow8","registrySubPath":"documentlibraryfriendlyname","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache8;L_workflowpath464","uniqueId":2650,"displayName":"Full URL to the document library with which the workflow is associated","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow8","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache8;L_workflowsig467","uniqueId":2653,"displayName":"Workflow requires the user to sign the document (Word/Excel only)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow8","registrySubPath":"sigclientrequired","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache9","uniqueId":2660,"displayName":"Workflow Cache 9","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_WorkflowCache9;L_workflowcachename468","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache9;L_workflowpath469","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache9;L_workflowdescrip470","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache9;L_workflowfriendly471","logicalOperator":"exists","values":null},{"dependee":"office16;L_WorkflowCache9;L_workflowsig472","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_WorkflowCache9;L_workflowcachename468","uniqueId":2655,"displayName":"Name of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow9","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache9;L_workflowdescrip470","uniqueId":2657,"displayName":"Description of the workflow to be shown to the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow9","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache9;L_workflowfriendly471","uniqueId":2658,"displayName":"Name of the document library to be shown the user","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow9","registrySubPath":"documentlibraryfriendlyname","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache9;L_workflowpath469","uniqueId":2656,"displayName":"Full URL to the document library with which the workflow is associated","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow9","registrySubPath":"path","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_WorkflowCache9;L_workflowsig472","uniqueId":2659,"displayName":"Workflow requires the user to sign the document (Word/Excel only)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"The values entered will be used by the client to provide the user with a workflow to be made available to the user for all of their documents.  The url should be a full path, such as 'http://localsharepointsite/Shared%20Documents'.  Some workflows require that the user sign a document with an in-document signature, workflows indicated as such will only be shown the the user as an option in applications that support in-document signatures. \n\nThis workflow must also be made available on the document library (setting these values only lets the client know about the workflow).","supportedPlatforms":["Windows"],"tags":["Workflow Cache","Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow\\cache\\workflow9","registrySubPath":"sigclientrequired","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Workgroupbuildingblockspath;L_Path2","uniqueId":2019,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specifies the location of workgroup building block templates.","supportedPlatforms":["Windows"],"tags":["Shared paths","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"shareddocumentparts","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"office16;L_Workgroupbuildingblockspath","uniqueId":2020,"displayName":"Workgroup building blocks path","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Workgroupbuildingblockspath;L_Path2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the location of workgroup building block templates.","supportedPlatforms":["Windows"],"tags":["Shared paths","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Workgrouptemplatespath","uniqueId":2026,"displayName":"Workgroup templates path","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"office16;L_Workgrouptemplatespath;L_workgrouptemplatespath329","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the location of workgroup templates.","supportedPlatforms":["Windows"],"tags":["Shared paths","Microsoft Office 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"office16;L_Workgrouptemplatespath;L_workgrouptemplatespath329","uniqueId":2025,"displayName":"Workgroup templates path","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specifies the location of workgroup templates.","supportedPlatforms":["Windows"],"tags":["Shared paths","Microsoft Office 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"sharedtemplates","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"office16;L_WritingAssistantAdminChoiceAdminChoice","uniqueId":3062,"displayName":"Enable Writing Assistant","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can use the Writing Assistant feature.\n      \nIf you enable or don’t configure this policy setting, users will be allowed to use Writing Assistant and it will be enabled by default (unless the users disabled it).\n\nIf you disable this policy setting, users won't see Writing Assistant by default.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for Enterprise.\n      ","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"writingassistantadminchoice","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Xitsonga","uniqueId":2290,"displayName":"Xitsonga","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Xitsonga","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ts-za","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Yiddish","uniqueId":2293,"displayName":"Yiddish","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Yiddish","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"yi-hebr","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_YiPRC","uniqueId":2292,"displayName":"Yi (China)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Yi (China)","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"ii-cn","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;L_Yoruba","uniqueId":2294,"displayName":"Yoruba","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enables the editing language Yoruba","supportedPlatforms":["Windows"],"tags":["Enabled Editing Languages","Editing Languages","Language Preferences","Microsoft Office 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\languageresources\\enabledlanguages","registrySubPath":"yo-ng","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;office16;L_Loop_Preview","uniqueId":5367,"displayName":"Enable preview features for Loop","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls the availability of preview features, also referred to as beta features, within Loop.\n\nIf you enable this policy setting, users will have access to preview features in Loop.\n\nIf you disable this policy setting, users will not have access to preview features in Loop.\n\nIf you don’t configure this policy setting, users will also not have access to preview features in Loop.\n\nImportant: If you have a Microsoft 365 Business/Education subscription, your use of this preview is governed by the Product Terms ( https://go.microsoft.com/fwlink/?linkid=2279845 ). Also, please note that notwithstanding the limitations in the Preview provision of the Microsoft Products and Services Data Protection Addendum (DPA) ( https://go.microsoft.com/fwlink/?linkid=2280723 ), the following terms in the DPA apply to this preview: Processing of Personal Data, GDPR, and Data Security.","supportedPlatforms":["Windows","Mac","Web"],"tags":["LoopPreview","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\loop","registrySubPath":"LoopPreview","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"office16;office16;L_Stream_Video_Record","uniqueId":5381,"displayName":"Record a Stream video from within supported Microsoft 365 apps","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls the ability to record Stream videos, including webcam and screen recordings, within supported Microsoft 365 applications.\n\nThe policy specifically applies to Outlook on the Web, the new Outlook for Windows, and the Loop application.\n\nIf you enable or do not configure this policy setting, users can record themselves and/or their screen, enabling them to create Stream videos within the supported Microsoft 365 applications.\n\nIf you disable this policy setting, users can’t record and create Stream videos within the supported Microsoft 365 applications.\n\nNote: This policy setting is exclusive to Outlook on the Web, the new Outlook for Windows, and the Loop application. It does not apply to the Stream Web Application.","supportedPlatforms":["Windows","Web"],"tags":["Stream Video Record","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\stream","registrySubPath":"StreamVideoRecord","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_AddOneNoteicontonotificationarea","uniqueId":3184,"displayName":"Add OneNote icon to notification area","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the option ''Place OneNote icon in the notification area of the taskbar''.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\other","registrySubPath":"runsystemtrayapp","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_AddsignaturetoOneNoteemailmessages","uniqueId":3087,"displayName":"Add signature to OneNote email messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the option ''Add the following signature to e-mail messages and Web pages created in OneNote''.","supportedPlatforms":["Windows"],"tags":["E-mail","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\other","registrySubPath":"emailsignature","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_AllowOneNoteemailattachments","uniqueId":3086,"displayName":"Allow OneNote e-mail attachments","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the option ''Attach a copy of the original notes as a OneNote file''.","supportedPlatforms":["Windows"],"tags":["E-mail","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options","registrySubPath":"email attachment","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_AttachEmbeddedFilesToTheEmail","uniqueId":3085,"displayName":"Attach embedded files to the email message as separate files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to configure the \"Attach embedded files to the email message as separate file\" option found under File tab | Options | Advanced | E-mail sent from OneNote.\n\nIf you enable or do not configure this policy setting, embedded files are attached to the email message as separate files.\n\nIf you disable this policy setting, embedded files are not attached to the email message as separate files.","supportedPlatforms":["Windows"],"tags":["E-mail","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options","registrySubPath":"email embedded files","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_AutoBulletRecognition","uniqueId":3073,"displayName":"Auto Bullet Recognition","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the option ''Apply bullets to lists automatically''.","supportedPlatforms":["Windows"],"tags":["Editing","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\editing","registrySubPath":"bullet auto reco","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_AutoKeyboardSwitching","uniqueId":3078,"displayName":"Auto Keyboard Switching","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Check/Unchecks the option ''Switch keyboards automatically''.","supportedPlatforms":["Windows"],"tags":["Editing","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\language","registrySubPath":"autokeyboard","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_Automaticallybackupmynotebook;L_Automaticallybackupatthisintervalmin","uniqueId":3140,"displayName":"Automatically back up at this interval (min):","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"2","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"3","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"4","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"5","description":"","tags":[],"dependencyGroup":null},{"value":10,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"10","description":"","tags":[],"dependencyGroup":null},{"value":15,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"15","description":"","tags":[],"dependencyGroup":null},{"value":30,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"30","description":"","tags":[],"dependencyGroup":null},{"value":60,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"60","description":"","tags":[],"dependencyGroup":null},{"value":120,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"120","description":"","tags":[],"dependencyGroup":null},{"value":180,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"180","description":"","tags":[],"dependencyGroup":null},{"value":240,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"240","description":"","tags":[],"dependencyGroup":null},{"value":300,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"300","description":"","tags":[],"dependencyGroup":null},{"value":360,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"360","description":"","tags":[],"dependencyGroup":null},{"value":480,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"480","description":"","tags":[],"dependencyGroup":null},{"value":720,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"720","description":"","tags":[],"dependencyGroup":null},{"value":960,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"960","description":"","tags":[],"dependencyGroup":null},{"value":1440,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1440","description":"","tags":[],"dependencyGroup":null},{"value":2880,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"2880","description":"","tags":[],"dependencyGroup":null},{"value":4320,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"4320","description":"","tags":[],"dependencyGroup":null},{"value":5760,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"5760","description":"","tags":[],"dependencyGroup":null},{"value":7200,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"7200","description":"","tags":[],"dependencyGroup":null},{"value":8640,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"8640","description":"","tags":[],"dependencyGroup":null},{"value":10080,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"10080","description":"","tags":[],"dependencyGroup":null},{"value":20160,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"20160","description":"","tags":[],"dependencyGroup":null},{"value":30240,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"30240","description":"","tags":[],"dependencyGroup":null},{"value":40320,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"40320","description":"","tags":[],"dependencyGroup":null},{"value":50400,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"50400","description":"","tags":[],"dependencyGroup":null},{"value":60480,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"60480","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Checks/Unchecks the option ''Automatically back up my notebook at the following time interval''.","supportedPlatforms":["Windows"],"tags":["Backup","OneNote Options","Microsoft OneNote 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\save","registrySubPath":"backupruneveryxminutes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_Automaticallybackupmynotebook","uniqueId":3141,"displayName":"Automatically back up my notebook...","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_Automaticallybackupmynotebook;L_Checktoenableautomaticbackup","logicalOperator":"exists","values":null},{"dependee":"onent16;L_Automaticallybackupmynotebook;L_Automaticallybackupatthisintervalmin","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Checks/Unchecks the option ''Automatically back up my notebook at the following time interval''.","supportedPlatforms":["Windows"],"tags":["Backup","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_Automaticallybackupmynotebook;L_Checktoenableautomaticbackup","uniqueId":3139,"displayName":"Check to enable automatic backup","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the option ''Automatically back up my notebook at the following time interval''.","supportedPlatforms":["Windows"],"tags":["Backup","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\save","registrySubPath":"backupenableautobackup","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_AutomaticallyswitchbetweenPenandSelectionTool","uniqueId":3083,"displayName":"Automatically switch between Pen and Selection Tool","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Pen","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\pen","registrySubPath":"automodeswitch","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_AutoNumberingRecognition","uniqueId":3072,"displayName":"Auto Numbering Recognition","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the option ''Apply numbering to lists automatically''.","supportedPlatforms":["Windows"],"tags":["Editing","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\editing","registrySubPath":"numbering auto reco","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_BlockAllUnmanagedAddins","uniqueId":3186,"displayName":"Block all unmanaged add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting blocks all add-ins that are not managed by the \"List of managed add-ins\" policy setting.\n\nIf you enable this policy setting, and the \"List of managed add-ins\" policy setting is also enabled, all add-ins are blocked except those that are configured as 1 (always enabled) or 2 (configurable by the user) in the \"List of managed add-ins\" policy setting.\n\nIf you disable or do not configure this policy setting, users can enable or disable any add-ins that are not managed by the \"List of managed add-ins\" policy setting.","supportedPlatforms":["Windows"],"tags":["Add-ins","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\resiliency","registrySubPath":"restricttolist","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_ChoosedefaultcodectobeusedforVideonotebook","uniqueId":3103,"displayName":"Choose default codec to be used for Video notebook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_ChoosedefaultcodectobeusedforVideonotebook;L_ChoosetheWindowsMediaVideo8codec","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This option will set the default codec used by OneNote for video recording that are created in OneNote.","supportedPlatforms":["Windows"],"tags":["Audio and Video","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_ChoosedefaultcodectobeusedforVideonotebook;L_ChoosetheWindowsMediaVideo8codec","uniqueId":3102,"displayName":"Choose the Windows Media Video 8 codec:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"Windows Media Video 8 for Color Pocket PCs (150 Kbps)","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Color Pocket PCs (150 Kbps)","description":"","tags":[],"dependencyGroup":null},{"value":"Windows Media Video 8 for Dial-up Modems or Single-channel ISDN (28.8 to 56 Kbps)","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dial-up Modems or Single-channel ISDN (28.8 to 56 Kbps)","description":"","tags":[],"dependencyGroup":null},{"value":"Windows Media Video 8 for LAN, Cable Modem, or xDSL (100 to 768 Kbps)","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"LAN, Cable Modem, or xDSL (100 to 768 Kbps)","description":"","tags":[],"dependencyGroup":null},{"value":"Windows Media Video 8 for Dial-up Modems or LAN (28.8 to 100 Kbps)","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dial-up Modems or LAN (28.8 to 100 Kbps)","description":"","tags":[],"dependencyGroup":null},{"value":"Windows Media Video 8 for Dial-up Modems (28.8 Kbps)","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dial-up Modems (28.8 Kbps)","description":"","tags":[],"dependencyGroup":null},{"value":"Windows Media Video 8 for Dial-up Modems (56 Kbps)","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dial-up Modems (56 Kbps)","description":"","tags":[],"dependencyGroup":null},{"value":"Windows Media Video 8 for Local Area Network (100 Kbps)","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Local Area Network (100 Kbps)","description":"","tags":[],"dependencyGroup":null},{"value":"Windows Media Video 8 for Local Area Network (256 Kbps)","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Local Area Network (256 Kbps)","description":"","tags":[],"dependencyGroup":null},{"value":"Windows Media Video 8 for Local Area Network (384 Kbps)","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Local Area Network (384 Kbps)","description":"","tags":[],"dependencyGroup":null},{"value":"Windows Media Video 8 for Broadband (NTSC, 700 Kbps)","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Broadband (NTSC, 700 Kbps)","description":"","tags":[],"dependencyGroup":null},{"value":"Windows Media Video 8 for Broadband (NTSC, 1400 Kbps)","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Broadband (NTSC, 1400 Kbps)","description":"","tags":[],"dependencyGroup":null},{"value":"Windows Media Video 8 for Broadband (PAL, 384 Kbps)","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Broadband (PAL, 384 Kbps)","description":"","tags":[],"dependencyGroup":null},{"value":"Windows Media Video 8 for Broadband (PAL, 700 Kbps)","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Broadband (PAL, 700 Kbps)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"Windows Media Video 8 for Color Pocket PCs (150 Kbps)","description":"This option will set the default codec used by OneNote for video recording that are created in OneNote.","supportedPlatforms":["Windows"],"tags":["Audio and Video","OneNote Options","Microsoft OneNote 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\audio","registrySubPath":"videocaptureprofile","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"onent16;L_ConfigureCNGCipherChainingMode","uniqueId":3107,"displayName":"Configure CNG cipher chaining mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_ConfigureCNGCipherChainingMode;L_ConfigureCNGCipherChainingModeDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the cipher chaining mode used.\n\nIf you enable this policy setting, the cipher chaining mode specified will be applied.\n\nIf you disable or do not configure this policy setting, Cipher Block Chaining (CBC) will be the default CNG cipher chaining mode used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_ConfigureCNGCipherChainingMode;L_ConfigureCNGCipherChainingModeDropID","uniqueId":3106,"displayName":"Configure CNG cipher chaining mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"ChainingModeCBC","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cipher Block Chaining (CBC)","description":"","tags":[],"dependencyGroup":null},{"value":"ChainingModeCFB","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cipher Feedback (CFB)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"ChainingModeCBC","description":"This policy setting allows you to configure the cipher chaining mode used.\n\nIf you enable this policy setting, the cipher chaining mode specified will be applied.\n\nIf you disable or do not configure this policy setting, Cipher Block Chaining (CBC) will be the default CNG cipher chaining mode used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","OneNote Options","Microsoft OneNote 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\security\\crypto","registrySubPath":"cipherchaining","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"onent16;L_Copyitemswhenmovingthem","uniqueId":3090,"displayName":"Copy items when moving them","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to configure tagged notes.\n\nIf you enable or do not configure this policy setting, the option \"Leave original tagged notes unchanged\" will be checked.\n\nIf you disable this policy setting, the option \"Show original tagged notes as dimmed\" will be checked.","supportedPlatforms":["Windows"],"tags":["Note Flags","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\other","registrySubPath":"duplicatenoteflag","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_Createallnewpageswithrulelines","uniqueId":3081,"displayName":"Create all new pages with rule lines","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Pen","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\pen","registrySubPath":"userulelines","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_DaysBackToKeepInVersionHistory","uniqueId":3158,"displayName":"Days back to keep in version history","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_DaysBackToKeepInVersionHistory;L_DaysBackToKeepInVersionHistorySpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to set the number of days when all version history items created before this value will be deleted.  With a 2016 format notebook, OneNote will automatically store previous versions of the pages in the notebook, and it will also store a recycle bin for all of the deleted pages and sections.\n\nIf you enable this policy setting, you can set the number of days back to delete version history.\n\nIf you disable or do not configure this policy setting OneNote will default to keeping previous versions for all days in the past.  This is the default value of -1.","supportedPlatforms":["Windows"],"tags":["Versions and Recyle Bin","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_DaysBackToKeepInVersionHistory;L_DaysBackToKeepInVersionHistorySpinID","uniqueId":3157,"displayName":"Days back to keep versions","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":365},"dataType":"Integer"},"defaultValue":"1","description":"This policy setting allows you to set the number of days when all version history items created before this value will be deleted.  With a 2016 format notebook, OneNote will automatically store previous versions of the pages in the notebook, and it will also store a recycle bin for all of the deleted pages and sections.\n\nIf you enable this policy setting, you can set the number of days back to delete version history.\n\nIf you disable or do not configure this policy setting OneNote will default to keeping previous versions for all days in the past.  This is the default value of -1.","supportedPlatforms":["Windows"],"tags":["Versions and Recyle Bin","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\versions","registrySubPath":"deleteallversionsafter","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_DaysBackToKeepItemsInRecycleBin","uniqueId":3160,"displayName":"Days back to keep items in recycle bin","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_DaysBackToKeepItemsInRecycleBin;L_DaysBackToKeepItemsInRecycleBinSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to set the number of days before which all items added to the Recycle Bin before value will be deleted when the version history is pruned.  With a 2016 format notebook, OneNote will automatically store previous versions of the pages in the notebook, and it will also store a recycle bin for all of the deleted pages and sections.\n\nIf you enable this policy setting, you can set the number of days in the past to keep recycle bin items.\n\nIf you do not configure this policy setting OneNote will use the default value of 60 days in the past.","supportedPlatforms":["Windows"],"tags":["Versions and Recyle Bin","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_DaysBackToKeepItemsInRecycleBin;L_DaysBackToKeepItemsInRecycleBinSpinID","uniqueId":3159,"displayName":"Days back to keep items in recycle bin","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":365},"dataType":"Integer"},"defaultValue":"60","description":"This policy setting allows you to set the number of days before which all items added to the Recycle Bin before value will be deleted when the version history is pruned.  With a 2016 format notebook, OneNote will automatically store previous versions of the pages in the notebook, and it will also store a recycle bin for all of the deleted pages and sections.\n\nIf you enable this policy setting, you can set the number of days in the past to keep recycle bin items.\n\nIf you do not configure this policy setting OneNote will use the default value of 60 days in the past.","supportedPlatforms":["Windows"],"tags":["Versions and Recyle Bin","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\versions","registrySubPath":"daystokeeprecycleditems","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_DaysOfAllVersions","uniqueId":3152,"displayName":"Days all Version History items are \"safe\" from pruning","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_DaysOfAllVersions;L_DaysOfAllVersionsSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a period of time during which OneNote maintains comprehensive version history pages. After the time specified, OneNote maintains more basic version history pages, which uses less storage space.\n\nIf you enable this policy setting, OneNote maintains comprehensive version history pages for the length of time you specify, and then maintains basic version history pages once the time period expires.\n\nIf you disable or do not configure this policy setting, OneNote maintains comprehensive version history pages for 2 days, and then maintains basic version history pages once the time period expires.\n      ","supportedPlatforms":["Windows"],"tags":["Versions and Recyle Bin","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_DaysOfAllVersions;L_DaysOfAllVersionsSpinID","uniqueId":3151,"displayName":"Days back","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":365},"dataType":"Integer"},"defaultValue":"2","description":"This policy setting allows you to specify a period of time during which OneNote maintains comprehensive version history pages. After the time specified, OneNote maintains more basic version history pages, which uses less storage space.\n\nIf you enable this policy setting, OneNote maintains comprehensive version history pages for the length of time you specify, and then maintains basic version history pages once the time period expires.\n\nIf you disable or do not configure this policy setting, OneNote maintains comprehensive version history pages for 2 days, and then maintains basic version history pages once the time period expires.\n      ","supportedPlatforms":["Windows"],"tags":["Versions and Recyle Bin","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\versions","registrySubPath":"daysofallversions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_DaysOfHourlyVersionsNotToPruneAfterDaysBack","uniqueId":3154,"displayName":"Days of hourly versions not to prune after Days Back","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_DaysOfHourlyVersionsNotToPruneAfterDaysBack;L_DaysOfHourlyVersionsNotToPruneAfterDaysBackSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to set the number of hourly versions not to prune after Days Back.  With a 2016 format notebook, OneNote will automatically store previous versions of the pages in the notebook, and it will also store a recycle bin for all of the deleted pages and sections.\n\nIf you enable this policy setting, you may specify the number of days to keep hourly versions after the Days Back setting. This value specifies the number of days past \"DaysOfAllVersions\" to keep hourly version history information.  Users will keep one version per hour for this number of days after \"DaysOfAllVersions\".\n\nIf you disable or do not configure this policy setting, OneNote will keep hourly versions for the past 5 days.","supportedPlatforms":["Windows"],"tags":["Versions and Recyle Bin","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_DaysOfHourlyVersionsNotToPruneAfterDaysBack;L_DaysOfHourlyVersionsNotToPruneAfterDaysBackSpinID","uniqueId":3153,"displayName":"Days back","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":365},"dataType":"Integer"},"defaultValue":"5","description":"This policy setting allows you to set the number of hourly versions not to prune after Days Back.  With a 2016 format notebook, OneNote will automatically store previous versions of the pages in the notebook, and it will also store a recycle bin for all of the deleted pages and sections.\n\nIf you enable this policy setting, you may specify the number of days to keep hourly versions after the Days Back setting. This value specifies the number of days past \"DaysOfAllVersions\" to keep hourly version history information.  Users will keep one version per hour for this number of days after \"DaysOfAllVersions\".\n\nIf you disable or do not configure this policy setting, OneNote will keep hourly versions for the past 5 days.","supportedPlatforms":["Windows"],"tags":["Versions and Recyle Bin","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\versions","registrySubPath":"daysofhourlyversions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_DefaultFontName","uniqueId":3075,"displayName":"Default Font Name","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_DefaultFontName;L_Font","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the value in the option ''Font''.","supportedPlatforms":["Windows"],"tags":["Editing","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_DefaultFontName;L_Font","uniqueId":3074,"displayName":"Font:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specifies the value in the option ''Font''.","supportedPlatforms":["Windows"],"tags":["Editing","OneNote Options","Microsoft OneNote 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\editing","registrySubPath":"defaultfontface","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"onent16;L_DefaultFontSize","uniqueId":3077,"displayName":"Default Font Size","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_DefaultFontSize;L_FontSize","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the value in the option ''Size''.","supportedPlatforms":["Windows"],"tags":["Editing","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_DefaultFontSize;L_FontSize","uniqueId":3076,"displayName":"Font Size:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specifies the value in the option ''Size''.","supportedPlatforms":["Windows"],"tags":["Editing","OneNote Options","Microsoft OneNote 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\editing","registrySubPath":"defaultfontsize","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"onent16;L_DefaultunitofmeasurementusedinOneNote","uniqueId":3183,"displayName":"Default unit of measurement used in OneNote","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_DefaultunitofmeasurementusedinOneNote;L_Specifydefaultunitofmeasurement","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value in the option ''Measurement units''.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_DefaultunitofmeasurementusedinOneNote;L_Specifydefaultunitofmeasurement","uniqueId":3182,"displayName":"Specify default unit of measurement:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Inch","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Centimeter","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Millimeter","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Point","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Pica","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the value in the option ''Measurement units''.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\other","registrySubPath":"measurementunit","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_Disableaudosearch","uniqueId":3092,"displayName":"Disable audio search","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Disables OneNote audio search feature.","supportedPlatforms":["Windows"],"tags":["Audio and Video","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\other","registrySubPath":"enableaudiosearch","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_disablecommandbarbuttonsandmenuitems290","uniqueId":3196,"displayName":"Disable commands","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_disablecommandbarbuttonsandmenuitems290;L_EnteracommandbarIDtodisable","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable any command bar button and menu item with a command bar ID, including command bar buttons and menu items that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, all default command bar buttons or menu items are available to users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft OneNote 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_disablecommandbarbuttonsandmenuitems290;L_EnteracommandbarIDtodisable","uniqueId":3195,"displayName":"Enter a command bar ID to disable","settingType":{"possibleValues":{"possibleValuesType":"List","ValueType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to disable any command bar button and menu item with a command bar ID, including command bar buttons and menu items that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, all default command bar buttons or menu items are available to users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft OneNote 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\disabledcmdbaritemslist","registryPath":"TCID","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"onent16;L_Disableembeddedfiles","uniqueId":3169,"displayName":"Disable embedded files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"To disable the ability to embed files on a OneNote page, so people cannot transmit files that might not be caught by anti-virus software, etc.  Note: This policy will only limit embedded files in the OneNote UI, if a page has an embedded file OneNote will still sync and replicate the embedded files in the file system.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options","registrySubPath":"disableembeddedfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_DisableinstalledOneNoteaddins","uniqueId":3146,"displayName":"Disable installed OneNote Add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Turns off all of the installed OneNote Add-ins.","supportedPlatforms":["Windows"],"tags":["Add-ins","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\security","registrySubPath":"disablealladdins","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_DisableLinkedAudiofeature","uniqueId":3093,"displayName":"Disable Linked Audio feature","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to configure the Record Audio and the Record Video commands on the Insert tab.\n\nIf you enable this policy setting, the commands will be not be available.\n\nIf you disable or do not configure this policy, the commands will be available.","supportedPlatforms":["Windows"],"tags":["Audio and Video","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\audio","registrySubPath":"disablerecording","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_DisableOCR","uniqueId":3164,"displayName":"Disable OCR","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy turns off the OneNote image optical character recognition (OCR) feature. The OCR feature allows OneNote to automatically scan through images to find text that will appear in search results.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\other","registrySubPath":"disableocr","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_DisableOneNoteCOMAPI","uniqueId":3145,"displayName":"Disable OneNote COM API","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Disable OneNote COM API - this disables add-on applications that may use the COM API. Note that it also breaks other features that use this API such as sending information from Outlook to OneNote.","supportedPlatforms":["Windows"],"tags":["Add-ins","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\security","registrySubPath":"disablecomapi","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_DisableOneNotescreenclippingnotifications","uniqueId":3170,"displayName":"Disable OneNote screen clipping notifications","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Turns off all of the OneNote screen clipping notifications.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\other","registrySubPath":"disablescreenclippingballoon","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_DisableOneNoteScreenClippings","uniqueId":3171,"displayName":"Disable OneNote Screen Clippings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Disables the screen clipping feature in OneNote.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\other","registrySubPath":"disablescreenclippings","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_DisableOutlooksendemailtoOneNoteoption","uniqueId":3144,"displayName":"Disable Outlook send email to OneNote option","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy disables the OneNote ''Send to OneNote'' add-in for Microsoft Outlook.  By default OneNote installs an add-in on the Outlook toolbar which allows users to send emails to OneNote.  The ''Send to OneNote'' button appears on the main mail module in Outlook as well as when viewing an email message.  You may disable this feature with this policy.","supportedPlatforms":["Windows"],"tags":["Send to OneNote","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\outlookandweb","registrySubPath":"disablesendemailtoonenote","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_Disablepasswordprotectedsections","uniqueId":3134,"displayName":"Disable password protected sections","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Disables the ability to create new password protected sections.  You can however still unlock and edit existing sections which had a password set.","supportedPlatforms":["Windows"],"tags":["Password","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\general","registrySubPath":"passwordprotectiondisabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_DisableScratchout","uniqueId":3080,"displayName":"Disable scratch out","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Disables the scratch out gesture while inking.","supportedPlatforms":["Windows"],"tags":["Pen","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\pen","registrySubPath":"disablescratchout","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_disableshortcutkeys291","uniqueId":3198,"displayName":"Disable shortcut keys","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_disableshortcutkeys291;L_Enterakeyandmodifiertodisable","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable any shortcut key by using its virtual key code ID, including shortcut keys that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter a virtual key code ID number to disable a specific shortcut key.\n\nIf you disable or do not configure this policy setting, all default shortcut keys are enabled for users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft OneNote 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_disableshortcutkeys291;L_Enterakeyandmodifiertodisable","uniqueId":3197,"displayName":"Enter a key and modifier to disable","settingType":{"possibleValues":{"possibleValuesType":"List","ValueType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to disable any shortcut key by using its virtual key code ID, including shortcut keys that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter a virtual key code ID number to disable a specific shortcut key.\n\nIf you disable or do not configure this policy setting, all default shortcut keys are enabled for users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft OneNote 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\disabledshortcutkeyslist","registryPath":"KeyMod","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"onent16;L_DisableSupportDiagnostics","uniqueId":3191,"displayName":"Turn off support diagnostics in OneNote","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether OneNote sends client information to support services on failure.\n\nSending client information to support services on failure can help diagnose the issue, provide resolution steps, or show contextual error messaging to the user.\n\nIf you enable this policy setting, OneNote won’t send client information to support services on failure.\n\nIf you disable or don’t configure this policy setting, OneNote will send client information to support services on failure.\n\nNote: This policy setting only applies to Version 2207 and later of OneNote.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\general","registrySubPath":"disablesupportdiagnostics","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_Disallowsaddonsaccesstopass","uniqueId":3133,"displayName":"Disallows add-ons access to password protected sections","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This option disallows extensibility add-ons the ability to access password protected sections if they are unlocked.","supportedPlatforms":["Windows"],"tags":["Password","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\security","registrySubPath":"allowaddinaccesstoencryptedfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_DoNotPruneVersionsOverTime","uniqueId":3150,"displayName":"Do not prune versions over time","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off OneNote's automatic pruning.  With a 2016 format notebook, OneNote will automatically store previous versions of the pages in the notebook, and it will also store a recycle bin for all of the deleted pages and sections.\n\nIf you enable this policy setting, OneNote will not prune previous versions.\n\nIf you disable or do not configure this policy setting, OneNote will prune previous versions.  The default value is to prune versions over time.  You should only enable this policy setting if OneNote should not prune previous versions.","supportedPlatforms":["Windows"],"tags":["Versions and Recyle Bin","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\versions","registrySubPath":"pruneversionsovertime","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_EmbeddedFilesBlockedExtensions","uniqueId":3166,"displayName":"Embedded Files Blocked Extensions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_EmbeddedFilesBlockedExtensions;L_empty12","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"To disable the ability of the users in your organization from being able to open a file attachment of a specific file type from a Microsoft OneNote page, add the extensions you want to disable using this format: \".ext1;.ext2;\" If you want to disable the opening of any attachment from a OneNote page, see the Disable embedded files policy. You cannot block embedded audio and video recordings (WMA & WMV) with this policy instead refer to the Disable embedded files policy.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_EmbeddedFilesBlockedExtensions;L_empty12","uniqueId":3165,"displayName":"Embedded Files Blocked Extensions","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"To disable the ability of the users in your organization from being able to open a file attachment of a specific file type from a Microsoft OneNote page, add the extensions you want to disable using this format: \".ext1;.ext2;\" If you want to disable the opening of any attachment from a OneNote page, see the Disable embedded files policy. You cannot block embedded audio and video recordings (WMA & WMV) with this policy instead refer to the Disable embedded files policy.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\embeddedfileopenoptions","registrySubPath":"blockedextensions","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"onent16;L_EnableabilitytooptimizeOneNotefiles;L_ChecktoenableabilitytooptimizeOneNotefiles","uniqueId":3130,"displayName":"Check to enable ability to optimize OneNote files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the option ''Optimize sections after OneNote has been inactive for the following number of minutes''.","supportedPlatforms":["Windows"],"tags":["Save","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\save","registrySubPath":"enableoptimizesections","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_EnableabilitytooptimizeOneNotefiles","uniqueId":3132,"displayName":"Enable ability to optimize OneNote files...","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_EnableabilitytooptimizeOneNotefiles;L_ChecktoenableabilitytooptimizeOneNotefiles","logicalOperator":"exists","values":null},{"dependee":"onent16;L_EnableabilitytooptimizeOneNotefiles;L_OptimizeOneNotefilesatthisintervalmin","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Checks/Unchecks the option ''Optimize sections after OneNote has been inactive for the following number of minutes''.","supportedPlatforms":["Windows"],"tags":["Save","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_EnableabilitytooptimizeOneNotefiles;L_OptimizeOneNotefilesatthisintervalmin","uniqueId":3131,"displayName":"Optimize OneNote files at this interval (min):","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":32767},"dataType":"Integer"},"description":"Checks/Unchecks the option ''Optimize sections after OneNote has been inactive for the following number of minutes''.","supportedPlatforms":["Windows"],"tags":["Save","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\save","registrySubPath":"optimizesectionsintervalminutes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_IncludelinktosourcewhenpastingfromtheInternet","uniqueId":3079,"displayName":"Include link to source when pasting from the Internet","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Editing","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\editing","registrySubPath":"pasteincludeurl","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_ListOfManagedAddins","uniqueId":3188,"displayName":"List of managed add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_ListOfManagedAddins;L_ListOfManagedAddins2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify which add-ins are always enabled, always disabled (blocked), or configurable by the user. To block add-ins that are not managed by this policy setting, you must also configure the \"Block all unmanaged add-ins\" policy setting.\n\nTo enable this policy setting, provide the following information for each add-in:\n\nIn \"Value name,\" specify the programmatic identifier (ProgID) for COM add-ins.\n\nTo obtain the ProgID for an add-in, use Registry Editor on the client computer where the add-in is installed to locate key names under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Office\\OneNote\\Addins or HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Office\\OneNote\\Addins.\n\nYou can also obtain the ProgID of an add-in by using Office Telemetry Dashboard.\n\nIn \"Value,\" specify the value as follows:\n\nTo specify that an add-in is always disabled (blocked), type 0.\n\nTo specify that an add-in is always enabled, type 1.\n\nTo specify that an add-in is configurable by the user and not blocked by the \"Block all unmanaged add-ins\" policy setting when enabled, type 2.\n\nIf you disable or do not enable this policy setting, the list of managed add-ins is deleted. If the \"Block all unmanaged add-ins\" policy setting is enabled, then all add-ins are blocked.","supportedPlatforms":["Windows"],"tags":["Add-ins","OneNote Options","Microsoft OneNote 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\resiliency\\addinlist","registrySubPath":"policyon","enforcedValues":{"enabled":1}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\resiliency\\addinlist","registrySubPath":"policyon","enforcedValues":{"enabled":1}}]}}},{"id":"onent16;L_ListOfManagedAddins;L_ListOfManagedAddins2","uniqueId":3187,"displayName":"List of managed add-ins","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to specify which add-ins are always enabled, always disabled (blocked), or configurable by the user. To block add-ins that are not managed by this policy setting, you must also configure the \"Block all unmanaged add-ins\" policy setting.\n\nTo enable this policy setting, provide the following information for each add-in:\n\nIn \"Value name,\" specify the programmatic identifier (ProgID) for COM add-ins.\n\nTo obtain the ProgID for an add-in, use Registry Editor on the client computer where the add-in is installed to locate key names under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Office\\OneNote\\Addins or HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Office\\OneNote\\Addins.\n\nYou can also obtain the ProgID of an add-in by using Office Telemetry Dashboard.\n\nIn \"Value,\" specify the value as follows:\n\nTo specify that an add-in is always disabled (blocked), type 0.\n\nTo specify that an add-in is always enabled, type 1.\n\nTo specify that an add-in is configurable by the user and not blocked by the \"Block all unmanaged add-ins\" policy setting when enabled, type 2.\n\nIf you disable or do not enable this policy setting, the list of managed add-ins is deleted. If the \"Block all unmanaged add-ins\" policy setting is enabled, then all add-ins are blocked.","supportedPlatforms":["Windows"],"tags":["Add-ins","OneNote Options","Microsoft OneNote 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\resiliency\\addinlist","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"onent16;L_Loadanotebookonfirstboot;L_empty13","uniqueId":3167,"displayName":"Load a notebook on first boot","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Points to a folder containing a notebook that should be loaded on first boot.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\other","registrySubPath":"addnotebooks","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"onent16;L_Loadanotebookonfirstboot","uniqueId":3168,"displayName":"Load a notebook on first boot","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_Loadanotebookonfirstboot;L_empty13","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Points to a folder containing a notebook that should be loaded on first boot.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_LocationofBackupFolder;L_BackupFolder","uniqueId":3126,"displayName":"Backup Folder:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Save","OneNote Options","Microsoft OneNote 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\paths","registrySubPath":"backupfolderpath","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"onent16;L_LocationofBackupFolder","uniqueId":3127,"displayName":"Location of Backup Folder","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_LocationofBackupFolder;L_BackupFolder","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Save","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_Locationofunfilednotessection","uniqueId":3125,"displayName":"Location of unfiled notes section","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_Locationofunfilednotessection;L_OpenSideNotesinthissection","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Location where OneNote stores the unfiled notes section.","supportedPlatforms":["Windows"],"tags":["Save","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_Locationofunfilednotessection;L_OpenSideNotesinthissection","uniqueId":3124,"displayName":"Open Side Notes in this section:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Location where OneNote stores the unfiled notes section.","supportedPlatforms":["Windows"],"tags":["Save","OneNote Options","Microsoft OneNote 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\paths","registrySubPath":"unfilednotessection","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"onent16;L_Lockpasswordprotectedsectionsafteruserhasntworkedonthemforatime;L_Checktolocksections","uniqueId":3136,"displayName":"Check to lock sections","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"OneNote supports password protecting sections and they are unlocked once a user types the password and can be locked again by either a timeout period or when you navigate away from the section.  This option will lock the section after the user hasn't used the section for the selected amount of time.","supportedPlatforms":["Windows"],"tags":["Password","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\security","registrySubPath":"lockidlesections","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_Lockpasswordprotectedsectionsafteruserhasntworkedonthemforatime","uniqueId":3138,"displayName":"Lock password protected sections after user hasn't worked on them for a time","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_Lockpasswordprotectedsectionsafteruserhasntworkedonthemforatime;L_Checktolocksections","logicalOperator":"exists","values":null},{"dependee":"onent16;L_Lockpasswordprotectedsectionsafteruserhasntworkedonthemforatime;L_Timeintervalminutestolockpasswordprotectedsections","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"OneNote supports password protecting sections and they are unlocked once a user types the password and can be locked again by either a timeout period or when you navigate away from the section.  This option will lock the section after the user hasn't used the section for the selected amount of time.","supportedPlatforms":["Windows"],"tags":["Password","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_Lockpasswordprotectedsectionsafteruserhasntworkedonthemforatime;L_Timeintervalminutestolockpasswordprotectedsections","uniqueId":3137,"displayName":"Time interval (minutes) to lock password protected sections:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"5","description":"","tags":[],"dependencyGroup":null},{"value":10,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"10","description":"","tags":[],"dependencyGroup":null},{"value":15,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"15","description":"","tags":[],"dependencyGroup":null},{"value":30,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"30","description":"","tags":[],"dependencyGroup":null},{"value":60,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"60","description":"","tags":[],"dependencyGroup":null},{"value":120,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"120","description":"","tags":[],"dependencyGroup":null},{"value":240,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"240","description":"","tags":[],"dependencyGroup":null},{"value":480,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"480","description":"","tags":[],"dependencyGroup":null},{"value":720,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"720","description":"","tags":[],"dependencyGroup":null},{"value":1440,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1440","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"OneNote supports password protecting sections and they are unlocked once a user types the password and can be locked again by either a timeout period or when you navigate away from the section.  This option will lock the section after the user hasn't used the section for the selected amount of time.","supportedPlatforms":["Windows"],"tags":["Password","OneNote Options","Microsoft OneNote 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\security","registrySubPath":"passwordtimeout","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_LockpasswordprotectedsectionsassoonasInavigateawayfromthem","uniqueId":3135,"displayName":"Lock password protected sections as soon as I navigate away from them","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"OneNote supports password protecting sections and they are unlocked once a user types the password and can be locked again by either a timeout period or when you navigate away from the section.  This option will lock the section once you navigate away from the password protected section.","supportedPlatforms":["Windows"],"tags":["Password","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\security","registrySubPath":"locksectionsimmediately","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_MaximumNumberOfOncePerDayVersionHistoryItemsKept","uniqueId":3156,"displayName":"Maximum number of once-per-day version history items kept","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_MaximumNumberOfOncePerDayVersionHistoryItemsKept;L_MaximumNumberOfOncePerDayVersionHistoryItemsKeptSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to set the number of once-per-day history items to be kept for each page.  With a 2016 format notebook, OneNote will automatically store previous versions of the pages in the notebook, and it will also store a recycle bin for all of the deleted pages and sections.\n\nIf you enable this policy setting, you can set the number of versions per day to keep.  If you set a value of -1 this will tell OneNote to keep all old once-per-day version history items.\n \nIf you disable or do not configure this policy setting OneNote will keep a page for the past 10 days every day in the past.","supportedPlatforms":["Windows"],"tags":["Versions and Recyle Bin","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_MaximumNumberOfOncePerDayVersionHistoryItemsKept;L_MaximumNumberOfOncePerDayVersionHistoryItemsKeptSpinID","uniqueId":3155,"displayName":"Max number of versions","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":365},"dataType":"Integer"},"defaultValue":"10","description":"This policy setting allows you to set the number of once-per-day history items to be kept for each page.  With a 2016 format notebook, OneNote will automatically store previous versions of the pages in the notebook, and it will also store a recycle bin for all of the deleted pages and sections.\n\nIf you enable this policy setting, you can set the number of versions per day to keep.  If you set a value of -1 this will tell OneNote to keep all old once-per-day version history items.\n \nIf you disable or do not configure this policy setting OneNote will keep a page for the past 10 days every day in the past.","supportedPlatforms":["Windows"],"tags":["Versions and Recyle Bin","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\versions","registrySubPath":"maxuniquedayversions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_Navigationbarappearsontheright","uniqueId":3068,"displayName":"Navigation bar appears on the right","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This option is to specify where the navigation bar appears.","supportedPlatforms":["Windows"],"tags":["Display","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\other","registrySubPath":"navbaronleft","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_NotebookPresence","uniqueId":3185,"displayName":"Notebook Presence","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting enables or disables the Notebook Presence feature in OneNote, which broadcasts user presence within a notebook and enables real-time synchronization for users who are editing the same page. Note:  Any change to this policy does not take effect until OneNote is restarted.\n\nIf you enable or do not configure this policy setting, users are notified when they are editing the same page in a notebook as another user. OneNote also enters real-time sync when it discovers multiple users editing the same page. \n\nIf you disable this policy setting, users are not notified when they are editing the same page in a notebook as another user. OneNote does not enter real-time sync when multiple users are editing the same page.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options","registrySubPath":"disablepresence","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_NotebookRoot;L_empty1","uniqueId":3122,"displayName":"Notebook Root","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"To change to where new notebooks are defaulted, enter a path to a folder relative to your documents.","supportedPlatforms":["Windows"],"tags":["Save","OneNote Options","Microsoft OneNote 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\save","registrySubPath":"notebook root","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"onent16;L_NotebookRoot","uniqueId":3123,"displayName":"Notebook Root","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_NotebookRoot;L_empty1","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"To change to where new notebooks are defaulted, enter a path to a folder relative to your documents.","supportedPlatforms":["Windows"],"tags":["Save","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_Numberofbackupcopiestokeep","uniqueId":3143,"displayName":"Number of backup copies to keep","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_Numberofbackupcopiestokeep;L_numberofbackupcopiestokeep2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Backup","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_Numberofbackupcopiestokeep;L_numberofbackupcopiestokeep2","uniqueId":3142,"displayName":"Number of backup copies to keep","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":1000},"dataType":"Integer"},"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Backup","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\save","registrySubPath":"backupnumberofbackupstokeep","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_Numberofdaysbeforewarningthatserveris;L_empty14","uniqueId":3172,"displayName":"Number of days before warning that server is inaccessible","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":30},"dataType":"Integer"},"defaultValue":"7","description":"Set the number of days until OneNote warns that the server is inaccessible and prompts for a new location for the affected files.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\synchronization","registrySubPath":"inaccessibleserverdaysbeforewarn","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_Numberofdaysbeforewarningthatserveris","uniqueId":3173,"displayName":"Number of days before warning that server is inaccessible","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_Numberofdaysbeforewarningthatserveris;L_empty14","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Set the number of days until OneNote warns that the server is inaccessible and prompts for a new location for the affected files.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_OneNoteSensitivityLabels","uniqueId":3194,"displayName":"Enable OneNote Sensitivity Labels","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Purview Sensitivity Label capabilities can be enabled for OneNote Sections.\n\nIf you enable this policy, users can use supported Purview features, such as manual labeling, label removal, or default labels, to apply sensitivity labels to OneNote sections and help protect sensitive information. At this time, mandatory labels, auto labeling, and dynamic watermarking are not supported.\n\nIf you disable this policy, users won't be able to apply, change or remove Sensitivity Labels in OneNote Sections.\n\nIf you do not configure this policy setting, users won't be able to apply, change or remove Sensitivity Labels in OneNote Sections.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\other","registrySubPath":"sensitivitylabels","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_OneNoteSpellingOptions;L_empty11","uniqueId":3147,"displayName":"OneNote Spelling Options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"no spell checking","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"check spelling as you type","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"hide spelling errors","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"check spelling but hide errors","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"These options change the \"When correcting spelling in OneNote\" options that appear in the File tab | Option | Proofing dialog box.","supportedPlatforms":["Windows"],"tags":["Spelling","OneNote Options","Microsoft OneNote 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\shared tools\\proofing tools\\1.0\\office","registrySubPath":"onenotespellingoptions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_OneNoteSpellingOptions","uniqueId":3148,"displayName":"OneNote Spelling Options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_OneNoteSpellingOptions;L_empty11","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"These options change the \"When correcting spelling in OneNote\" options that appear in the File tab | Option | Proofing dialog box.","supportedPlatforms":["Windows"],"tags":["Spelling","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_OneNoteTextPrediction","uniqueId":3192,"displayName":"OneNote text prediction","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy setting controls whether users will see and be able to accept text predictions when writing notes in English in OneNote.\n\nIf you enable or don't configure this policy setting, users will see and be able to accept predicted text by using the Tab key or right arrow key while writing their notes. Or they can simply keep typing to ignore the predicted text.\n\nIf you disable this policy setting, users will not be able to see or accept text predictions while writing notes.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n      ","supportedPlatforms":["Windows"],"tags":["Editing","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\editing","registrySubPath":"textprediction","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_Pagetabsappearontheleft","uniqueId":3065,"displayName":"Page tabs appear on the left","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_Pagetabsappearontheleft;L_Specifylocationofthepagetabcontrol","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Right: Unchecks the option ''Page tabs appear on the left''. | Left: Checks the option ''Page tabs appear on the left''.","supportedPlatforms":["Windows"],"tags":["Display","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_Pagetabsappearontheleft;L_Specifylocationofthepagetabcontrol","uniqueId":3064,"displayName":"Specify location of the page tab control:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Right","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Left","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Right: Unchecks the option ''Page tabs appear on the left''. | Left: Checks the option ''Page tabs appear on the left''.","supportedPlatforms":["Windows"],"tags":["Display","OneNote Options","Microsoft OneNote 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\other","registrySubPath":"pagetabsonleft","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_Percentageofunuseddiskspacetoallowinsections;L_EnterPercentage","uniqueId":3128,"displayName":"Enter Percentage:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":100},"dataType":"Integer"},"description":"Sets the value in the option ''Percentage of unused space to allow in sections without optimizing''.","supportedPlatforms":["Windows"],"tags":["Save","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\save","registrySubPath":"percentfreespacebeforeoptimize","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_Percentageofunuseddiskspacetoallowinsections","uniqueId":3129,"displayName":"Percentage of unused disk space to allow in sections","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_Percentageofunuseddiskspacetoallowinsections;L_EnterPercentage","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value in the option ''Percentage of unused space to allow in sections without optimizing''.","supportedPlatforms":["Windows"],"tags":["Save","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_Rewindfromstartofparagraphbythefollowingnumberofseconds;L_Rewindfromstartofparagraphbysec","uniqueId":3100,"displayName":"Rewind from start of paragraph by: (sec)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":999},"dataType":"Integer"},"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Audio and Video","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\audio","registrySubPath":"rewind","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_Rewindfromstartofparagraphbythefollowingnumberofseconds","uniqueId":3101,"displayName":"Rewind from start of paragraph by the following number of seconds","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_Rewindfromstartofparagraphbythefollowingnumberofseconds;L_Rewindfromstartofparagraphbysec","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Audio and Video","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_SetCNGCipherAlgorithm","uniqueId":3105,"displayName":"Set CNG cipher algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_SetCNGCipherAlgorithm;L_SetCNGCipherAlgorithmID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the CNG cipher algorithm that is used.\n\nIf you enable this policy setting, then the cipher provided will be used if it is a supported algorithm.\n\nIf you disable or do not configure this policy setting, AES will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_SetCNGCipherAlgorithm;L_SetCNGCipherAlgorithmID","uniqueId":3104,"displayName":"CNG cipher algorithm:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to configure the CNG cipher algorithm that is used.\n\nIf you enable this policy setting, then the cipher provided will be used if it is a supported algorithm.\n\nIf you disable or do not configure this policy setting, AES will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","OneNote Options","Microsoft OneNote 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\security\\crypto","registrySubPath":"cipheralgorithm","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"onent16;L_SetCNGCipherKeyLength","uniqueId":3109,"displayName":"Set CNG cipher key length","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_SetCNGCipherKeyLength;L_SetCNGCipherKeyLengthSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the number of bits to use when creating the cipher key.  This number will be rounded down to a multiple of 8.\n\nIf you enable this policy setting, the key bits specified will be used.\n\nIf you disable or do not configure this policy setting, the default value will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_SetCNGCipherKeyLength;L_SetCNGCipherKeyLengthSpinID","uniqueId":3108,"displayName":"Cipher key length","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":1000000},"dataType":"Integer"},"defaultValue":"","description":"This policy setting allows you to configure the number of bits to use when creating the cipher key.  This number will be rounded down to a multiple of 8.\n\nIf you enable this policy setting, the key bits specified will be used.\n\nIf you disable or do not configure this policy setting, the default value will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\security\\crypto","registrySubPath":"cipherkeybits","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_SetCNGPasswordSpinCount","uniqueId":3117,"displayName":"Set CNG password spin count","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_SetCNGPasswordSpinCount;L_SetCNGPasswordSpinCountSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the number of times to spin (rehash) the password verifier.\n\nIf you enable this policy setting, the number specified will be the number of times the password will be rehashed.\n\nIf you disable or do not configure this policy setting, the default (100000) will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_SetCNGPasswordSpinCount;L_SetCNGPasswordSpinCountSpinID","uniqueId":3116,"displayName":"Set CNG password spin count","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":10000000},"dataType":"Integer"},"defaultValue":"100000","description":"This policy setting allows you to specify the number of times to spin (rehash) the password verifier.\n\nIf you enable this policy setting, the number specified will be the number of times the password will be rehashed.\n\nIf you disable or do not configure this policy setting, the default (100000) will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\security\\crypto","registrySubPath":"passwordspincount","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_SetParametersForCNGContext","uniqueId":3113,"displayName":"Set parameters for CNG context","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_SetParametersForCNGContext;L_SetParametersForCNGContextID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the encryption parameters that should be used for the CNG context. \n\nIf you enable this policy setting, the parameters specified will be passed to the CNG context.\n\nIf you disable or do not configure this policy setting, the default CNG values will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_SetParametersForCNGContext;L_SetParametersForCNGContextID","uniqueId":3112,"displayName":"Parameters","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to specify the encryption parameters that should be used for the CNG context. \n\nIf you enable this policy setting, the parameters specified will be passed to the CNG context.\n\nIf you disable or do not configure this policy setting, the default CNG values will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","OneNote Options","Microsoft OneNote 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\security\\crypto","registrySubPath":"context","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"onent16;L_SetUNCIntervalToPollForChangesOnFileServers","uniqueId":3162,"displayName":"Set UNC interval to poll for changes on file servers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_SetUNCIntervalToPollForChangesOnFileServers;L_SetUNCIntervalToPollForChangesOnFileServersSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to change the synchronization interval at which OneNote will poll for changes on the server.  When OneNote synchronizes a notebook on UNC, also known as SMB or Windows File shares, OneNote will receive notifications from the file server as well as poll the server looking for new updates on the server.\n\nBy making the interval faster it will make OneNote synchronize faster, but it also might cause performance issues on the server.\n\nIf you enable this policy setting, you may specify the number of seconds OneNote will poll.\n\nIf you disable or do not configure this policy setting, OneNote will automatically poll every 30 seconds.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_SetUNCIntervalToPollForChangesOnFileServers;L_SetUNCIntervalToPollForChangesOnFileServersSpinID","uniqueId":3161,"displayName":"Interval to poll the server (seconds)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":3600},"dataType":"Integer"},"defaultValue":"30","description":"This policy setting allows you to change the synchronization interval at which OneNote will poll for changes on the server.  When OneNote synchronizes a notebook on UNC, also known as SMB or Windows File shares, OneNote will receive notifications from the file server as well as poll the server looking for new updates on the server.\n\nBy making the interval faster it will make OneNote synchronize faster, but it also might cause performance issues on the server.\n\nIf you enable this policy setting, you may specify the number of seconds OneNote will poll.\n\nIf you disable or do not configure this policy setting, OneNote will automatically poll every 30 seconds.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\save","registrySubPath":"folderpollinterval","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_SharePointbackgroundsyncintervalmultiplier;L_empty16","uniqueId":3176,"displayName":"Multiplier for background sync interval for notebooks stored on SharePoint","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":10},"dataType":"Integer"},"defaultValue":"1","description":"This policy setting allows you to increase the interval between background polls of a SharePoint site for changes to notebooks.\n\nIf you enable this policy setting, OneNote will poll SharePoint less frequently for changes to whole notebooks. Intervals are multiplied by the entered value, a positive integer value from 1 to 10. Larger intervals will slow notebook sync but reduce server load.\n\nIf you disable or do not configure this policy setting, OneNote will sync notebooks at the default rate (multiplier value of 1).\n\nNote: This policy setting only applies to volume licensed versions of Office 2016 that use Windows Installer (MSI), such as Office Professional Plus 2016 and Office Standard 2016.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\save","registrySubPath":"sharepointbackgroundsyncintervalmultiplier","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_SharePointbackgroundsyncintervalmultiplier","uniqueId":3177,"displayName":"Multiplier for background sync interval for notebooks stored on SharePoint","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_SharePointbackgroundsyncintervalmultiplier;L_empty16","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to increase the interval between background polls of a SharePoint site for changes to notebooks.\n\nIf you enable this policy setting, OneNote will poll SharePoint less frequently for changes to whole notebooks. Intervals are multiplied by the entered value, a positive integer value from 1 to 10. Larger intervals will slow notebook sync but reduce server load.\n\nIf you disable or do not configure this policy setting, OneNote will sync notebooks at the default rate (multiplier value of 1).\n\nNote: This policy setting only applies to volume licensed versions of Office 2016 that use Windows Installer (MSI), such as Office Professional Plus 2016 and Office Standard 2016.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_SharePointlivesyncintervalmultiplier;L_empty17","uniqueId":3178,"displayName":"Multiplier for foreground sync interval for the currently viewed section stored on SharePoint","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":10},"dataType":"Integer"},"defaultValue":"1","description":"This policy setting allows you to increase the interval between foreground polls of a SharePoint site for changes to the currently viewed section.\n\nIf you enable this policy setting, OneNote will poll SharePoint less frequently for changes to the currently viewed section. Intervals are multiplied by the entered value, a positive integer value from 1 to 10. Larger intervals will slow section sync but reduce server load.\n\nIf you disable or do not configure this policy setting, OneNote will sync the currently viewed section at the default rate (multiplier value of 1).\n\nNote: This policy setting only applies to volume licensed versions of Office 2016 that use Windows Installer (MSI), such as Office Professional Plus 2016 and Office Standard 2016.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\save","registrySubPath":"sharepointlivesyncintervalmultiplier","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_SharePointlivesyncintervalmultiplier","uniqueId":3179,"displayName":"Multiplier for foreground sync interval for the currently viewed section stored on SharePoint","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_SharePointlivesyncintervalmultiplier;L_empty17","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to increase the interval between foreground polls of a SharePoint site for changes to the currently viewed section.\n\nIf you enable this policy setting, OneNote will poll SharePoint less frequently for changes to the currently viewed section. Intervals are multiplied by the entered value, a positive integer value from 1 to 10. Larger intervals will slow section sync but reduce server load.\n\nIf you disable or do not configure this policy setting, OneNote will sync the currently viewed section at the default rate (multiplier value of 1).\n\nNote: This policy setting only applies to volume licensed versions of Office 2016 that use Windows Installer (MSI), such as Office Professional Plus 2016 and Office Standard 2016.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_SharePointpresenceintervalmultiplier;L_empty18","uniqueId":3180,"displayName":"Multiplier for Presence sync interval for notebooks stored on SharePoint","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":10},"dataType":"Integer"},"defaultValue":"1","description":"This policy setting allows you to increase the interval between polls to SharePoint to determine active users of notebooks. OneNote will sync notebooks at a faster rate when other users are interacting with a notebook.\n\nIf you enable this policy setting, OneNote will poll SharePoint less frequently to determine if there are other users currently interacting with notebooks. Intervals are multiplied by the entered value, a positive integer value from 1 to 10. Larger intervals will slow detection of concurrent users in notebooks but reduce server load.\n\nIf you disable or do not configure this policy setting, OneNote will poll for active users of notebooks at the default rate (multiplier value of 1).\n\nNote: This policy setting only applies to volume licensed versions of Office 2016 that use Windows Installer (MSI), such as Office Professional Plus 2016 and Office Standard 2016.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\save","registrySubPath":"sharepointpresenceintervalmultiplier","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_SharePointpresenceintervalmultiplier","uniqueId":3181,"displayName":"Multiplier for Presence sync interval for notebooks stored on SharePoint","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_SharePointpresenceintervalmultiplier;L_empty18","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to increase the interval between polls to SharePoint to determine active users of notebooks. OneNote will sync notebooks at a faster rate when other users are interacting with a notebook.\n\nIf you enable this policy setting, OneNote will poll SharePoint less frequently to determine if there are other users currently interacting with notebooks. Intervals are multiplied by the entered value, a positive integer value from 1 to 10. Larger intervals will slow detection of concurrent users in notebooks but reduce server load.\n\nIf you disable or do not configure this policy setting, OneNote will poll for active users of notebooks at the default rate (multiplier value of 1).\n\nNote: This policy setting only applies to volume licensed versions of Office 2016 that use Windows Installer (MSI), such as Office Professional Plus 2016 and Office Standard 2016.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_SharePointsyncinterval;L_empty15","uniqueId":3174,"displayName":"SharePoint sync interval for notebooks stored on SharePoint","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":10,"maximum":604800},"dataType":"Integer"},"defaultValue":"600","description":"Limits the number of times OneNote polls a SharePoint site for changes to a section.  Enter the sync interval in seconds.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\save","registrySubPath":"sharepointsyncinterval","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_SharePointsyncinterval","uniqueId":3175,"displayName":"SharePoint sync interval for notebooks stored on SharePoint","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_SharePointsyncinterval;L_empty15","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Limits the number of times OneNote polls a SharePoint site for changes to a section.  Enter the sync interval in seconds.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_ShowDimmedTaggedNotesInTheTagsSummaryTaskPane","uniqueId":3091,"displayName":"Show dimmed tagged notes in the Tags Summary task pane","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the option \"Show dimmed tagged notes in the Tags Summary task pane.\"","supportedPlatforms":["Windows"],"tags":["Note Flags","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\other","registrySubPath":"showinactivenoteflag","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_ShowNoteContainers","uniqueId":3067,"displayName":"Show Note Containers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Display","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\other","registrySubPath":"shownotecontainers","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_ShowPasteOptionsbuttons","uniqueId":3071,"displayName":"Show Paste Options buttons","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Editing","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\other","registrySubPath":"pasteooui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_ShowTabletPCInputPanelonOneNotepages","uniqueId":3084,"displayName":"Show Tablet PC Input Panel on OneNote pages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Enable this policy to display the Tablet PC Input Panel on OneNote pages.","supportedPlatforms":["Windows"],"tags":["Pen","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\pen","registrySubPath":"showtabletpcinputpanel","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_SpecifyCNGHashAlgorithm","uniqueId":3115,"displayName":"Specify CNG hash algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_SpecifyCNGHashAlgorithm;L_SpecifyCNGHashAlgorithmDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the hash algorithm used.\n\nIf you enable this policy setting, the hashing algorithm selected will be used by CNG.\n\nIf you disable or do not configure this policy setting, the default CNG hash algorithm will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_SpecifyCNGHashAlgorithm;L_SpecifyCNGHashAlgorithmDropID","uniqueId":3114,"displayName":"Specify CNG hash algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"SHA1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA1","description":"","tags":[],"dependencyGroup":null},{"value":"SHA256","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA256","description":"","tags":[],"dependencyGroup":null},{"value":"SHA384","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA384","description":"","tags":[],"dependencyGroup":null},{"value":"SHA512","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA512","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"SHA256","description":"This policy setting allows you to specify the hash algorithm used.\n\nIf you enable this policy setting, the hashing algorithm selected will be used by CNG.\n\nIf you disable or do not configure this policy setting, the default CNG hash algorithm will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","OneNote Options","Microsoft OneNote 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\security\\crypto","registrySubPath":"hashalgorithm","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"onent16;L_SpecifyCNGRandomNumberGeneratorAlgorithm","uniqueId":3119,"displayName":"Specify CNG random number generator algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_SpecifyCNGRandomNumberGeneratorAlgorithm;L_SpecifyCNGRandomNumberGeneratorAlgorithmID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the CNG random number generator to use.\n\nIf you enable this policy setting, the random number generator specified will be used.\n\nIf you disable or do not configure this policy setting, the default random number generator will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_SpecifyCNGRandomNumberGeneratorAlgorithm;L_SpecifyCNGRandomNumberGeneratorAlgorithmID","uniqueId":3118,"displayName":"Random number generator:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to configure the CNG random number generator to use.\n\nIf you enable this policy setting, the random number generator specified will be used.\n\nIf you disable or do not configure this policy setting, the default random number generator will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","OneNote Options","Microsoft OneNote 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\security\\crypto","registrySubPath":"rngalgorithm","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"onent16;L_SpecifyCNGSaltLength","uniqueId":3121,"displayName":"Specify CNG salt length","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_SpecifyCNGSaltLength;L_SpecifyCNGSaltLengthSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specific the number of bytes of salt that should be used.\n\nIf you enable this policy setting, the bytes specified will be used.\n\nIf you disable or do not configure this policy setting, the default length or 16 will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_SpecifyCNGSaltLength;L_SpecifyCNGSaltLengthSpinID","uniqueId":3120,"displayName":"Number of bytes","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":5000},"dataType":"Integer"},"defaultValue":"16","description":"This policy setting allows you to specific the number of bytes of salt that should be used.\n\nIf you enable this policy setting, the bytes specified will be used.\n\nIf you disable or do not configure this policy setting, the default length or 16 will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\security\\crypto","registrySubPath":"saltbytes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_SpecifyEmbeddedFileSizeLimit;L_EmbeddedFileSizeLimit","uniqueId":3189,"displayName":"Embedded File Size Limit","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":10485760,"maximum":2147483648},"dataType":"Integer"},"description":"This policy setting enables you to specify the maximum embedded file size that users can insert directly into a OneNote notebook on a SharePoint server.\n \nIf you enable this policy setting, you can increase or decrease the default maximum file size of 50 MB. \n\nIf you increase this value, users can insert larger files directly into the notebook, but this may reduce server performance. \n\nIf you decrease this value, users can only insert smaller files directly into the notebook, which may improve server performance if OneNote sync is generating a lot of traffic.\n\nIf you disable or do not configure this policy setting, users cannot insert a file larger than 50MB inserted into a OneNote notebook. Instead, the file is uploaded to a SharePoint folder and inserted as a hyperlink into the notebook.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\general","registrySubPath":"insertedfilesdisallowembeddingsizethreshold","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_SpecifyEmbeddedFileSizeLimit","uniqueId":3190,"displayName":"Embedded File Size Limit","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_SpecifyEmbeddedFileSizeLimit;L_EmbeddedFileSizeLimit","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting enables you to specify the maximum embedded file size that users can insert directly into a OneNote notebook on a SharePoint server.\n \nIf you enable this policy setting, you can increase or decrease the default maximum file size of 50 MB. \n\nIf you increase this value, users can insert larger files directly into the notebook, but this may reduce server performance. \n\nIf you decrease this value, users can only insert smaller files directly into the notebook, which may improve server performance if OneNote sync is generating a lot of traffic.\n\nIf you disable or do not configure this policy setting, users cannot insert a file larger than 50MB inserted into a OneNote notebook. Instead, the file is uploaded to a SharePoint folder and inserted as a hyperlink into the notebook.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_SpecifyEncryptionCompatibility","uniqueId":3111,"displayName":"Specify encryption compatibility","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_SpecifyEncryptionCompatibility;L_SpecifyEncryptionCompatibilityDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the encrypted database compatibility.\n\nIf you enable this policy setting, the compatibility format specified will be applied during encryption for new files\n- Use legacy format\n- Use next generation format\n- All files save with next generation format\n\nIf you disable or do not configure this policy setting, the default setting, \"Use next generation format,\" will be applied.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_SpecifyEncryptionCompatibility;L_SpecifyEncryptionCompatibilityDropID","uniqueId":3110,"displayName":"Specify encryption compatibility","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use legacy format","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use next generation format","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"All files save with next generation format","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":2,"description":"This policy setting allows you to specify the encrypted database compatibility.\n\nIf you enable this policy setting, the compatibility format specified will be applied during encryption for new files\n- Use legacy format\n- Use next generation format\n- All files save with next generation format\n\nIf you disable or do not configure this policy setting, the default setting, \"Use next generation format,\" will be applied.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","OneNote Options","Microsoft OneNote 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\security\\crypto","registrySubPath":"compatmode","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_Specifynumberofbitstosamplewhenrecording;L_Bits","uniqueId":3094,"displayName":"Bits:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":8,"maximum":48},"dataType":"Integer"},"description":"Specifies the default number of bits per sample (value is in kbps) used when recording audio. If the appropriate codec is found, then this is the default bit depth used in the Format setting for Linked Audio, found under File tab | Options | Audio & Video.","supportedPlatforms":["Windows"],"tags":["Audio and Video","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\audio","registrySubPath":"defaultbitdepth","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_Specifynumberofbitstosamplewhenrecording","uniqueId":3095,"displayName":"Specify number of bits to sample when recording","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_Specifynumberofbitstosamplewhenrecording;L_Bits","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the default number of bits per sample (value is in kbps) used when recording audio. If the appropriate codec is found, then this is the default bit depth used in the Format setting for Linked Audio, found under File tab | Options | Audio & Video.","supportedPlatforms":["Windows"],"tags":["Audio and Video","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_Specifynumberofchannelstorecord;L_Channels12","uniqueId":3098,"displayName":"Channels (1-2):","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":2},"dataType":"Integer"},"description":"Specifies whether 1 or 2 channels are used when recording audio. If the appropriate codec is found, then this is the default number of channels used in the Format setting for Linked Audio found under File tab | Options | Audio & Video.","supportedPlatforms":["Windows"],"tags":["Audio and Video","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\audio","registrySubPath":"defaultchannels","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_Specifynumberofchannelstorecord","uniqueId":3099,"displayName":"Specify number of channels to record","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_Specifynumberofchannelstorecord;L_Channels12","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies whether 1 or 2 channels are used when recording audio. If the appropriate codec is found, then this is the default number of channels used in the Format setting for Linked Audio found under File tab | Options | Audio & Video.","supportedPlatforms":["Windows"],"tags":["Audio and Video","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_Specifyratetosampleaudiobitssecond;L_BitsSecond","uniqueId":3096,"displayName":"Bits/Second:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":8,"maximum":192},"dataType":"Integer"},"description":"Specifies the default sample rate (value is in kHz) used when recording audio. If the appropriate codec is found, then this is the default sample rate used in the Format setting for Linked Audio found under File tab | Options | Audio & Video.","supportedPlatforms":["Windows"],"tags":["Audio and Video","OneNote Options","Microsoft OneNote 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\audio","registrySubPath":"defaultsamplerate","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_Specifyratetosampleaudiobitssecond","uniqueId":3097,"displayName":"Specify rate to sample audio (bits/second)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_Specifyratetosampleaudiobitssecond;L_BitsSecond","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the default sample rate (value is in kHz) used when recording audio. If the appropriate codec is found, then this is the default sample rate used in the Format setting for Linked Audio found under File tab | Options | Audio & Video.","supportedPlatforms":["Windows"],"tags":["Audio and Video","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_Turnoffautocalculator","uniqueId":3070,"displayName":"Turn off auto calculator","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This option turns on/off the auto calculator functionality.","supportedPlatforms":["Windows"],"tags":["Editing","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\editing","registrySubPath":"autocalculate","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_TurnOffLinkCreationWith","uniqueId":3069,"displayName":"Turn off link creation with [[ ]]","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off link creation with [[ ]].  OneNote allows users to automatically create links by putting [[ ]] around a term.  OneNote will then automatically create a new page in that section and create a link on that text.\n\nIf you enable this policy setting, users will not be able to use [[ ]] to create a link and a new page.\n\nIf you disable or do not configure this policy setting, OneNote will automatically create links when users use [[ ]].","supportedPlatforms":["Windows"],"tags":["Editing","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\editing","registrySubPath":"wikilink","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_TurnOffNewStickyNotesInOneNote","uniqueId":3193,"displayName":"Disable the new Sticky Notes experience","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls the ability of users to access the new Sticky Notes experiences from OneNote.\n\nIf you enable this policy setting, users will be unable to access the new Sticky Notes experiences from OneNote.\n\nIf you disable this policy setting, users can access the new Sticky Notes experiences from OneNote.\n\nIf you do not set this policy setting, users can access the new Sticky Notes experiences from OneNote.\n\nNote: This policy does not affect the classic Microsoft Sticky Notes app available on the Microsoft Store. Additionally, disabling or not setting this policy does not guarantee access to the new Sticky Notes experiences from OneNote.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\other","registrySubPath":"ismemorywindowdisabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_TurnOffOneNoteAutoLinkedNoteTaking","uniqueId":3163,"displayName":"Turn off OneNote auto-linked note taking","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting turns off the OneNote auto note taking feature which allows you to take notes on items such as webpages, Word documents, etc.  OneNote will automatically record what pages or document you were viewing when you took this note.\n\nIf you enable this policy setting, OneNote will not automatically link notes when the user tries to turn on this feature.\n\nIf you disable or do not enable this policy, OneNote will automatically link notes when the user tries to turn on this feature.","supportedPlatforms":["Windows"],"tags":["Other","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\linkednotes","registrySubPath":"autolink","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_TurnOffVersionsAndNotebookRecycleBinInSharedNotebooks","uniqueId":3149,"displayName":"Turn off Versions and Notebook Recycle Bin in shared notebooks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off version history which includes versions and the notebook recycle bin.  With a 2016 format notebook, OneNote will automatically store previous versions of the pages in the notebook, and it will also store a recycle bin for all of the deleted pages and sections.\n\nIf you enable this policy setting, it will turn off version history.\n\nIf you disable or do not configure this policy setting, OneNote will store previous versions by default.","supportedPlatforms":["Windows"],"tags":["Versions and Recyle Bin","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\versions","registrySubPath":"enablehistory","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_Usepenpressuresensitivity","uniqueId":3082,"displayName":"Use pen pressure sensitivity","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Pen","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\pen","registrySubPath":"inkpressure","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"onent16;L_UsethissignatureforOneNoteemail;L_EntersignaturetouseforOneNoteemail","uniqueId":3088,"displayName":"Enter signature to use for OneNote e-mail","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Sets the value in the option ''Add the following signature to e-mail messages and Web pages created in OneNote''.","supportedPlatforms":["Windows"],"tags":["E-mail","OneNote Options","Microsoft OneNote 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\other","registrySubPath":"signature","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"onent16;L_UsethissignatureforOneNoteemail","uniqueId":3089,"displayName":"Use this signature for OneNote email","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"onent16;L_UsethissignatureforOneNoteemail;L_EntersignaturetouseforOneNoteemail","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value in the option ''Add the following signature to e-mail messages and Web pages created in OneNote''.","supportedPlatforms":["Windows"],"tags":["E-mail","OneNote Options","Microsoft OneNote 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"onent16;L_Verticalscrollbarappearsonleft","uniqueId":3066,"displayName":"Vertical scroll bar appears on left","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Display","OneNote Options","Microsoft OneNote 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\onenote\\options\\other","registrySubPath":"vertscrollbaronleft","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;DisableAccountSettingsDetectionService","uniqueId":3845,"displayName":"Prevent Outlook from interacting with the account settings detection service","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether Outlook can interact with the account settings detection service to gather information about a user's account settings.\n\nIf you enable this policy setting, users will need to manually configure their account settings.","supportedPlatforms":["Windows"],"tags":["E-mail","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\setup","registrySubPath":"disableaccountsettingsdetectionservice","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Accesstopublishedcalendars","uniqueId":3302,"displayName":"Access to published calendars","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines what restrictions apply to users who publish their calendars on Office.com or third-party World Wide Web Distributed Authoring and Versioning (WebDAV) servers. \n\nIf you enable or disable this policy setting, calendars that are published on Office.com must have restricted access (users other than the calendar owner/publisher who wish to view the calendar can only do so if they receive invitations from the calendar owner), and users cannot publish their calendars to third-party DAV servers. \n\nIf you do not configure this policy setting, users can share their calendars with others by publishing them to the Office.com Calendar Sharing Services and to a server that supports the World Wide Web Distributed Authoring and Versioning (WebDAV) protocol. Office.com allows users to choose whether to restrict access to their calendars to people they invite, or allow unrestricted access to anyone who knows the URL to reach the calendar. DAV access restrictions can only be achieved through server and folder permissions, and might require the assistance of a server administrator to set up and maintain.","supportedPlatforms":["Windows"],"tags":["Office.com Sharing Service","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\pubcal","registrySubPath":"restrictedaccessonly","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Addnewcategories","uniqueId":3742,"displayName":"Add new categories","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Addnewcategories;L_Enternewcategoriessemicolondelimited","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to add (append) new categories to the user's current list of categories.\n\nIf you enable this policy setting, you may add (append) new categories to the user's current list of categories (the default list of categories or the list of categories the user has created).  A category's length should not exceed 255 characters.\n\nIf you disable or do not configure this policy setting, the user's current list of categories is not modified.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Addnewcategories;L_Enternewcategoriessemicolondelimited","uniqueId":3741,"displayName":"Enter new categories (semicolon delimited)","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to add (append) new categories to the user's current list of categories.\n\nIf you enable this policy setting, you may add (append) new categories to the user's current list of categories (the default list of categories or the list of categories the user has created).  A category's length should not exceed 255 characters.\n\nIf you disable or do not configure this policy setting, the user's current list of categories is not modified.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"newcategories","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_AddpeopleIemailtotheSafeSendersList","uniqueId":3375,"displayName":"Add e-mail recipients to users' Safe Senders Lists","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether recipients' e-mail addresses are automatically added to the user's Safe Senders List in Microsoft Outlook. Sometimes users will send e-mail messages to request that they be taken off a mailing list. If the e-mail recipient is then automatically added to the Safe Senders List, future e-mail messages from that address will no longer be sent to the users Junk E-mail folder, even if it would otherwise be considered junk. \n\nIf you enable this policy setting, all recipients of outgoing messages are automatically added to users' Safe Senders Lists. If users respond to junk e-mail senders while this policy setting is Enabled, all future junk e-mail from the same address will be considered safe. \n\nIf you disable this policy setting, recipients of outgoing messages are not automatically added to the Safe Senders List. Users must explicitly add addresses to the list. \n\nIf you do not configure this policy setting, recipients of outgoing messages are not added automatically to individual users' Safe Senders Lists. However, users can change this configuration in the Outlook user interface.","supportedPlatforms":["Windows"],"tags":["Junk E-mail","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"junkmailtrustoutgoingrecipients","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_AddpropertiestoattachmentstoenableReplywithChanges","uniqueId":3282,"displayName":"Add properties to attachments to enable Reply with Changes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_AddpropertiestoattachmentstoenableReplywithChanges;L_AddpropertiestoattachmentstoenableReplywithChanges","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value for the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["When sending a message","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_AddpropertiestoattachmentstoenableReplywithChanges;L_AddpropertiestoattachmentstoenableReplywithChanges","uniqueId":3281,"displayName":"Add properties to attachments to enable Reply with Changes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Sets the value for the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["When sending a message","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"adhocreviewbehavior","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_AllowActiveXOneOffForms","uniqueId":3498,"displayName":"Allow Active X One Off Forms","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_AllowActiveXOneOffForms;L_empty29","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"By default, third-party ActiveX controls are not allowed to run in one-off forms in Outlook. You can change this behavior so that Safe Controls (Microsoft Forms 2.0 controls and the Outlook Recipient and Body controls) are allowed in one-off forms, or so that all ActiveX controls are allowed to run.","supportedPlatforms":["Windows"],"tags":["Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_AllowActiveXOneOffForms;L_empty29","uniqueId":3497,"displayName":"Allow Active X One Off Forms","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Load only Outlook Controls","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allows only Safe Controls","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allows all ActiveX Controls","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"By default, third-party ActiveX controls are not allowed to run in one-off forms in Outlook. You can change this behavior so that Safe Controls (Microsoft Forms 2.0 controls and the Outlook Recipient and Body controls) are allowed in one-off forms, or so that all ActiveX controls are allowed to run.","supportedPlatforms":["Windows"],"tags":["Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"allowactivexoneoffforms","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Allowattendeestoproposenewtimesformeetingsyouorganize","uniqueId":3334,"displayName":"Allow attendees to propose new times for meetings you organize","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"allowpropose","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Allowcommasasaddressseparator","uniqueId":3274,"displayName":"Allow commas as address separator","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Allowcommasasaddressseparator;L_Allowcommasasaddressseparator","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value for the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["When sending a message","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Allowcommasasaddressseparator;L_Allowcommasasaddressseparator","uniqueId":3273,"displayName":"Allow commas as address separator","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the value for the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["When sending a message","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"allowcommasinrecip","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_AllowCryptoAutosave","uniqueId":3737,"displayName":"Extend Outlook Autosave to include encrypted e-mail messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, Outlook does not automatically save copies of unsent e-mail messages that are encrypted. You can enable this setting so that Outlook autosaves unsent encrypted e-mail messages to the user's Drafts folder.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\mailsettings","registrySubPath":"allowautosavecryptomail","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_AllowPrivateKeyCheck","uniqueId":3847,"displayName":"Check for the user's private key when the user sends an encrypted email that includes the user as a recipient","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook checks for the user's private key when the user sends an encrypted email and the user is included as a recipient of the email. The user can be included as recipient either directly or as a member of a distribution list.\n\nIf you enable this policy setting, Outlook checks for the user's private key.\n\nIf you disable this policy setting, Outlook doesn't check for the user's private key.\n\nIf you don't configure this policy setting, Outlook checks for the user's private key.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"allowprivatekeycheck","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_AllowSelectionFloaties","uniqueId":3413,"displayName":"Show Mini Toolbar on selection","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Disabling this policy setting will result in Mini Toolbar not being displayed on text selection. By default, Mini Toolbar on selection is enabled and its visibility can be changed via a setting in the Editor Options dialog box.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\outlook","registrySubPath":"allowselectionfloaties","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_AllowUsersToLowerAttachments","uniqueId":3458,"displayName":"Allow users to demote attachments to Level 2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting controls whether Outlook users can demote attachments to Level 2 by using a registry key, which will allow them to save files to disk and open them from that location. Outlook uses two levels of security to restrict access to files attached to e-mail messages or other items. Files with specific extensions can be categorized as Level 1 (users cannot view the file) or Level 2 (users can open the file after saving it to disk). Users can freely open files of types that are not categorized as Level 1 or Level 2. \n\nIf you enable this policy setting, users can create a list of Level 1 file types to demote to Level 2 by adding the file types to the following registry key: HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\14.0\\Outlook\\Security\\Level1Remove. \n\nIf you disable or do not configure this policy setting, users cannot demote level 1 attachments to level 2, and the HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\14.0\\Outlook\\Security\\Level1Remove registry key has no effect.\n","supportedPlatforms":["Windows"],"tags":["Attachment Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"allowuserstolowerattachments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_AlwaysUseMSOAuthForAutodiscover","uniqueId":3851,"displayName":"Autodiscover is always capable of using modern authentication","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Autodiscover is always capable of using modern authentication, regardless of the authentication methods supported by the primary mailbox connection type.\n\nBy default, Autodiscover only uses authentication methods that are supported by the primary mailbox connection type. Modern authentication won't always be one of the supported authentication methods for some connection types.\n\nIf you enable this policy setting, Autodiscover is always capable of using modern authentication, regardless of the authentication methods supported by the primary mailbox connection type. Enabling this policy setting may result in additional prompts for users to provide their password, when modern authentication is used, but not supported for the connection type.\n\nIf you disable or don’t configure this policy setting, Autodiscover will only use authentication methods supported by the primary mailbox connection type.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\exchange","registrySubPath":"alwaysusemsoauthforautodiscover","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Applymacrosecuritysettings","uniqueId":3553,"displayName":"Apply macro security settings to macros, add-ins and additional actions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook also applies the macro security settings to installed COM add-ins and additional actions. \n\nIf you enable this policy setting, the macro security settings will also be applied to add-ins and additional actions. \n\nIf you disable or do not configure this policy setting, Outlook does not use the macro security settings to determine whether to run macros, installed COM add-ins, and additional actions.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"donttrustinstalledfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ArchiveIgnoreLastModifiedTime","uniqueId":3449,"displayName":"Change the criteria that Outlook uses to archive different item types","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"If you enable this policy setting, Outlook ignores the last modified date and archives items based on a date that is specific for the item type, as follows:\n\n-Email message: The received date.\n-Calendar item: The actual date that an appointment, event, or meeting is scheduled for.\n-Task: The completion date. Tasks that are not marked as completed are not archived. Tasks that are assigned to other users are archived only if the status is completed. \n-Note: The last modified date and time.\n-Journal entry: The date when the journal entry is created.\n-Contact: Not archived.\n\nIf you disable or do not configure this policy setting, Outlook archives different items based on the item type, as follows:\n\n-Email message: The received date or the last modified date and time, whichever is later. \n-Calendar item: The last modified date and time or the actual date that an appointment, event, or meeting is scheduled for, whichever is later. \n-Task: The completion date or the last modified date and time, whichever is later. Tasks that are not marked as completed are not archived. Tasks that are assigned to other users are archived only if the status is completed. \n-Note: The last modified date and time.\n-Journal entry: The date when the journal entry is created or the last modified date and time, whichever is later.\n-Contact: Not archived.","supportedPlatforms":["Windows"],"tags":["AutoArchive","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"archiveignorelastmodifiedtime","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_AttachmentSecureTemporaryFolder","uniqueId":3543,"displayName":"Attachment Secure Temporary Folder","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_AttachmentSecureTemporaryFolder;L_EntertheSecureFolderpath","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a folder path for the Secure Temporary Files folder rather than using the one that is randomly generated by Outlook. \n\nIf you enable this policy setting, you can specify a folder path for the Security Temporary Files folder rather than using the one that is randomly generated by Outlook. \n\nIf you disable or do not configure this policy setting, Outlook will assign the Secure Temporary Files folder a different random name for each user. \n\nImportant - If you must use a specific folder for Outlook attachments, Microsoft recommends that you use a local directory (for best performance), that you place the folder under the Temporary Internet Files folder (to benefit from the enhanced security on that folder), and that the folder name is unique and difficult to guess.","supportedPlatforms":["Windows"],"tags":["Signature Status dialog box","Cryptography","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_AttachmentSecureTemporaryFolder;L_EntertheSecureFolderpath","uniqueId":3542,"displayName":"Enter the Secure Folder path","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a folder path for the Secure Temporary Files folder rather than using the one that is randomly generated by Outlook. \n\nIf you enable this policy setting, you can specify a folder path for the Security Temporary Files folder rather than using the one that is randomly generated by Outlook. \n\nIf you disable or do not configure this policy setting, Outlook will assign the Secure Temporary Files folder a different random name for each user. \n\nImportant - If you must use a specific folder for Outlook attachments, Microsoft recommends that you use a local directory (for best performance), that you place the folder under the Temporary Internet Files folder (to benefit from the enhanced security on that folder), and that the folder name is unique and difficult to guess.","supportedPlatforms":["Windows"],"tags":["Signature Status dialog box","Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"outlooksecuretempfolder","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_AuthenticationwithExchangeServer","uniqueId":3616,"displayName":"Authentication with Exchange Server","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_AuthenticationwithExchangeServer;L_SelecttheauthenticationwithExchangeserver","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls which authentication method Outlook uses to authenticate with Microsoft Exchange Server. Note - Exchange Server supports the Kerberos authentication protocol and NTLM for authentication. The Kerberos protocol is the more secure authentication method and is supported on Windows 2000 Server and later versions. NTLM authentication is supported in pre-Windows 2000 environments.\n      \nIf you enable this policy setting, you can choose from three different options for controlling how Outlook authenticates with Microsoft Exchange Server:\n\n- Kerberos/NTLM password authentication. Outlook attempts to authenticate using the Kerberos authentication protocol. If this attempt fails, Outlook attempts to authenticate using NTLM. This option is the default configuration.\n\n- Kerberos password authentication. Outlook attempts to authenticate using the Kerberos protocol only.\n\n- NTLM password authentication. Outlook attempts to authenticate using NTLM only.\n\nIf you disable or do not configure this policy setting, Outlook will attempt to authenticate using the Kerberos authentication protocol. If it cannot (because no Windows 2000 or later domain controllers are available), it will authenticate using NTLM.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_AuthenticationwithExchangeServer;L_SelecttheauthenticationwithExchangeserver","uniqueId":3615,"displayName":"Select the authentication with Exchange server.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":9,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kerberos/NTLM Password Authentication","description":"","tags":[],"dependencyGroup":null},{"value":16,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kerberos Password Authentication","description":"","tags":[],"dependencyGroup":null},{"value":10,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"NTLM Password Authentication","description":"","tags":[],"dependencyGroup":null},{"value":2147545088,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Insert a smart card","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":16,"recommendation":"security"}],"defaultValue":9,"description":"This policy setting controls which authentication method Outlook uses to authenticate with Microsoft Exchange Server. Note - Exchange Server supports the Kerberos authentication protocol and NTLM for authentication. The Kerberos protocol is the more secure authentication method and is supported on Windows 2000 Server and later versions. NTLM authentication is supported in pre-Windows 2000 environments.\n      \nIf you enable this policy setting, you can choose from three different options for controlling how Outlook authenticates with Microsoft Exchange Server:\n\n- Kerberos/NTLM password authentication. Outlook attempts to authenticate using the Kerberos authentication protocol. If this attempt fails, Outlook attempts to authenticate using NTLM. This option is the default configuration.\n\n- Kerberos password authentication. Outlook attempts to authenticate using the Kerberos protocol only.\n\n- NTLM password authentication. Outlook attempts to authenticate using NTLM only.\n\nIf you disable or do not configure this policy setting, Outlook will attempt to authenticate using the Kerberos authentication protocol. If it cannot (because no Windows 2000 or later domain controllers are available), it will authenticate using NTLM.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"authenticationservice","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_AutoArchiveSettings;L_Archiveordeleteolditems","uniqueId":3443,"displayName":"Archive or delete old items","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"If you enable this policy setting, the options specified in the AutoArchive dialog box are disabled.","supportedPlatforms":["Windows"],"tags":["AutoArchive","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"archiveold","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_AutoArchiveSettings","uniqueId":3448,"displayName":"AutoArchive Settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_AutoArchiveSettings;L_TurnonAutoArchive","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_AutoArchiveSettings;L_RunAutoArchiveeveryxdays","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_AutoArchiveSettings;L_PromptbeforeAutoArchiveruns","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_AutoArchiveSettings;L_Deleteexpireditemsemailfoldersonly","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_AutoArchiveSettings;L_Archiveordeleteolditems","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_AutoArchiveSettings;L_Showarchivefolderinfolderlist","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_AutoArchiveSettings;L_Cleanoutitemsolderthan","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_AutoArchiveSettings;L_empty19","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_AutoArchiveSettings;L_Permanentlydeleteolditems","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"If you enable this policy setting, the options specified in the AutoArchive dialog box are disabled.","supportedPlatforms":["Windows"],"tags":["AutoArchive","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_AutoArchiveSettings;L_Cleanoutitemsolderthan","uniqueId":3445,"displayName":"Clean out items older than","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":60},"dataType":"Integer"},"description":"If you enable this policy setting, the options specified in the AutoArchive dialog box are disabled.","supportedPlatforms":["Windows"],"tags":["AutoArchive","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"archiveperiod","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_AutoArchiveSettings;L_Deleteexpireditemsemailfoldersonly","uniqueId":3442,"displayName":"Delete expired items (e-mail folders only)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"If you enable this policy setting, the options specified in the AutoArchive dialog box are disabled.","supportedPlatforms":["Windows"],"tags":["AutoArchive","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"deleteexpired","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_AutoArchiveSettings;L_empty19","uniqueId":3446,"displayName":"AutoArchive Settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Months","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Weeks","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Days","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"If you enable this policy setting, the options specified in the AutoArchive dialog box are disabled.","supportedPlatforms":["Windows"],"tags":["AutoArchive","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"archivegranularity","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_AutoArchiveSettings;L_Permanentlydeleteolditems","uniqueId":3447,"displayName":"Permanently delete old items","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"If you enable this policy setting, the options specified in the AutoArchive dialog box are disabled.","supportedPlatforms":["Windows"],"tags":["AutoArchive","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"archivedelete","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_AutoArchiveSettings;L_PromptbeforeAutoArchiveruns","uniqueId":3441,"displayName":"Prompt before AutoArchive runs","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"If you enable this policy setting, the options specified in the AutoArchive dialog box are disabled.","supportedPlatforms":["Windows"],"tags":["AutoArchive","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"promptforaging","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_AutoArchiveSettings;L_RunAutoArchiveeveryxdays","uniqueId":3440,"displayName":"Run AutoArchive every <x> days","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":60},"dataType":"Integer"},"description":"If you enable this policy setting, the options specified in the AutoArchive dialog box are disabled.","supportedPlatforms":["Windows"],"tags":["AutoArchive","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"everydays","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_AutoArchiveSettings;L_Showarchivefolderinfolderlist","uniqueId":3444,"displayName":"Show archive folder in folder list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"If you enable this policy setting, the options specified in the AutoArchive dialog box are disabled.","supportedPlatforms":["Windows"],"tags":["AutoArchive","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"archivemount","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_AutoArchiveSettings;L_TurnonAutoArchive","uniqueId":3439,"displayName":"Turn on AutoArchive","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"If you enable this policy setting, the options specified in the AutoArchive dialog box are disabled.","supportedPlatforms":["Windows"],"tags":["AutoArchive","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"doaging","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_AutoDiscoverRedirectServers","uniqueId":3853,"displayName":"Don’t show redirect warnings for Autodiscover for the specified HTTPS server names","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_AutoDiscoverRedirectServers;L_AutoDiscoverRedirectServersList","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify HTTPS server names for which Autodiscover won’t show a warning message when redirecting from HTTP to HTTPS.\n\nBy default, when an Autodiscover operation redirects from HTTP to HTTPS, you may be shown a warning message about the redirection.\n\nIf you enable this policy setting, you need to specify HTTPS server names, and for those server names, you won’t be shown a warning message. For example, if you enter contoso.com, you won’t be shown a warning message when Autodiscover redirects to https://contoso.com.\n\nIf you disable or don’t configure this policy setting, you may be shown a warning message when an Autodiscover operation redirects from HTTP to HTTPS.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\autodiscover\\redirectservers","registrySubPath":"policyon","enforcedValues":{"enabled":1}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\autodiscover\\redirectservers","registrySubPath":"policyon","enforcedValues":{"enabled":1}}]}}},{"id":"outlk16;L_AutoDiscoverRedirectServers;L_AutoDiscoverRedirectServersList","uniqueId":3852,"displayName":"HTTPS server names:","settingType":{"possibleValues":{"possibleValuesType":"List","ValueType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to specify HTTPS server names for which Autodiscover won’t show a warning message when redirecting from HTTP to HTTPS.\n\nBy default, when an Autodiscover operation redirects from HTTP to HTTPS, you may be shown a warning message about the redirection.\n\nIf you enable this policy setting, you need to specify HTTPS server names, and for those server names, you won’t be shown a warning message. For example, if you enter contoso.com, you won’t be shown a warning message when Autodiscover redirects to https://contoso.com.\n\nIf you disable or don’t configure this policy setting, you may be shown a warning message when an Autodiscover operation redirects from HTTP to HTTPS.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\autodiscover\\redirectservers","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_AutomaticallyConfigureProfileBasedOnActive","uniqueId":3595,"displayName":"Automatically configure profile based on Active Directory Primary SMTP address","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether a user’s Active Directory Primary SMTP address is automatically used when any new profile is created.\n\nIf you enable this policy setting, when a user creates any new profile, the user’s Active Directory Primary SMTP address is used for the profile. The user can only enter a profile name. The wizard used to configure specific profile settings is not shown to the user as the profile is created.\n\nNote: If you want only the first new profile to use the Active Directory Primary SMTP address, and allow the user to specify a different SMTP address when creating other profiles, then use the “Automatically configure profile based on Active Directory Primary SMTP address (one-time only)” policy setting instead.\n\nIf you disable or don’t configure this policy setting, when a user creates a new profile, the wizard used to configure specific profile settings is shown to the user and the user can specify any SMTP address as the profile is created.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\autodiscover","registrySubPath":"zeroconfigexchange","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_AutomaticallyConfigureProfileBasedOnActiveOnce","uniqueId":3596,"displayName":"Automatically configure profile based on Active Directory Primary SMTP address (one-time only)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether a user can create additional profiles and specify a different SMTP address, after the first profile is automatically created using the user’s Active Directory Primary SMTP address.\n\nIf you enable this policy setting, the first time a user creates a new profile, the user’s Active Directory Primary SMTP address is used for the profile. The user can only enter a profile name. The wizard used to configure specific profile settings is not shown to the user as the profile is created.\n\nAfter the first profile is created automatically, the user can manually create additional profiles. The wizard used to configure specific profile settings is shown to the user and the user can specify any SMTP address as the profile is created.\n\nNote: If you want the user’s Active Directory Primary SMTP address to always be used when creating a new profile, then use the “Automatically configure profile based on Active Directory Primary SMTP address” policy setting instead. If that policy setting is enabled, then it takes precedence over this policy setting.\n\nIf you disable or don’t configure this policy setting, when a user creates a new profile, the wizard used to configure specific profile settings is shown to the user and the user can specify any SMTP address as the profile is created.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\autodiscover","registrySubPath":"zeroconfigexchangeonce","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Automaticallydownloadenclosures","uniqueId":3624,"displayName":"Automatically download enclosures","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether Outlook automatically downloads enclosures on RSS items.\n\nIf you enable this policy setting, Outlook will automatically download enclosures on RSS items.\n\nIf you disable or do not configure this policy setting, enclosures on RSS items are not downloaded by default.","supportedPlatforms":["Windows"],"tags":["RSS Feeds","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\rss","registrySubPath":"enableattachments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_AutomaticallydownloadenclosuresWebCal","uniqueId":3634,"displayName":"Automatically download attachments","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook downloads files attached to Internet Calendar appointments. \n\nIf you enable this policy setting, Outlook automatically downloads all Internet Calendar appointment attachments \n\nIf you disable or do not configure this policy setting, Outlook does not download attachments when retrieving Internet Calendar appointments.","supportedPlatforms":["Windows"],"tags":["Internet Calendars","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\webcal","registrySubPath":"enableattachments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Automaticnamechecking","uniqueId":3276,"displayName":"Automatic name checking","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Automaticnamechecking;L_Automaticnamechecking","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value for the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["When sending a message","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Automaticnamechecking;L_Automaticnamechecking","uniqueId":3275,"displayName":"Automatic name checking","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the value for the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["When sending a message","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"autonamecheck","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Autoselectencodingforoutgoingmessages","uniqueId":3402,"displayName":"Auto-select encoding for outgoing messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["International Options","Mail Format","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mshtml\\international","registrySubPath":"autodetect_codepageout","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_BlockAllUnmanagedAddins","uniqueId":3795,"displayName":"Block all unmanaged add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting blocks all add-ins that are not managed by the \"List of managed add-ins\" policy setting.\n\nIf you enable this policy setting, and the \"List of managed add-ins\" policy setting is also enabled, all add-ins are blocked except those that are configured as 1 (always enabled) or 2 (configurable by the user) in the \"List of managed add-ins\" policy setting.\n\nIf you disable or do not configure this policy setting, users can enable or disable any add-ins that are not managed by the \"List of managed add-ins\" policy setting.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\resiliency","registrySubPath":"restricttolist","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Blockexternalcontent","uniqueId":3544,"displayName":"Display pictures and external content in HTML e-mail","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting setting controls whether Outlook downloads untrusted pictures and external content located in HTML e-mail messages without users explicitly choosing to download them. \n\nIf you enable this policy setting, Outlook will not automatically download content from external servers unless the sender is included in the Safe Senders list. Recipients can choose to download external content from untrusted senders on a message-by-message basis. \n\nIf you disable this policy setting, Outlook will display pictures and external content in HTML e-mail automatically.\n\nIf you do not configure this policy setting, Outlook does not download external content in HTML e-mail and RSS items unless the content is considered safe. Content that Outlook can be configured to consider safe includes: \n\n- Content in e-mail messages from senders and to recipients defined in the Safe Senders and Safe Recipients lists. \n- Content from Web sites in Internet Explorer's Trusted Sites security zone. \n- Content in RSS items. \n- Content from SharePoint Discussion Boards. Users can control what content is considered safe by changing the options in the \"Automatic Download\" section of the Trust Center. If Outlook's default blocking configuration is overridden, in the Trust Center or by some other method, Outlook will display external content in all HTML e-mail messages, including any that include Web beacons.","supportedPlatforms":["Windows"],"tags":["Automatic Picture Download Settings","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"blockextcontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_BlockGlobalAddressListSynchronization","uniqueId":3787,"displayName":"Block Global Address List synchronization","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to block the synchronization of contacts between Outlook and the Global Address List (GAL).\n\nIf you enable this policy setting, GAL contact synchronization is blocked.\n\nIf you disable or you do not configure this policy setting, GAL contact synchronization is allowed.","supportedPlatforms":["Windows"],"tags":["Outlook Social Connector","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\outlook\\socialconnector","registrySubPath":"disablecontactgalsync","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_BlockInternet","uniqueId":3548,"displayName":"Include Internet in Safe Zones for Automatic Picture Download","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting controls whether pictures and external content in HTML e-mail messages from untrusted senders on the Internet are downloaded without Outlook users explicitly choosing to do so. \n\nIf you enable this policy setting, Outlook will automatically download external content in all e-mail messages sent over the Internet and users will not be able to change the setting. \n\nIf you disable or do not configure this policy setting, Outlook does not consider the Internet a safe zone, which means that Outlook will not automatically download content from external servers unless the sender is included in the Safe Senders list. Recipients can choose to download external content from untrusted senders on a message-by-message basis.","supportedPlatforms":["Windows"],"tags":["Automatic Picture Download Settings","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"internet","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_BlockIntranet","uniqueId":3549,"displayName":"Include Intranet in Safe Zones for Automatic Picture Download","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether pictures and external content in HTML e-mail messages from untrusted senders on the local intranet are downloaded without Outlook users explictly choosing to do so. \n\nIf you enable this policy setting, Outlook will automatically download external content in all e-mail messages sent over the local intranet and users will not be able to change the setting. \n\nIf you disable or do not configure this policy setting, Outlook does not consider the local intranet a safe zone, which means that Outlook will not automatically download content from other servers in the Local Intranet zone unless the sender is included in the Safe Senders list. Recipients can choose to download external content from untrusted senders on a message-by-message basis.","supportedPlatforms":["Windows"],"tags":["Automatic Picture Download Settings","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"intranet","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_BlockNetworkActivitySynchronization","uniqueId":3785,"displayName":"Block network activity synchronization","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to block synchronization of status updates between Outlook and social networks.\n\nIf you enable this policy setting, social network activity synchronization is blocked.\n\nIf you disable or you do not configure this policy setting, social network activity synchronization is allowed.","supportedPlatforms":["Windows"],"tags":["Outlook Social Connector","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\outlook\\socialconnector","registrySubPath":"disableactivitydownload","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_BlockSocialNetworkContactSynchronization","uniqueId":3786,"displayName":"Block social network contact synchronization","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to block synchronization of contacts between Outlook and social networks.  \n\nIf you enable this policy setting, social network contact synchronization is blocked.\n\nIf you disable or you do not configure this policy setting, social network contact synchronization is allowed.","supportedPlatforms":["Windows"],"tags":["Outlook Social Connector","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\outlook\\socialconnector","registrySubPath":"disablecontactdownload","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_BlockSpecificSocialNetworkproviders","uniqueId":3792,"displayName":"Block specific social network providers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_BlockSpecificSocialNetworkproviders;L_BlockSpecificSocialNetworkprovidersID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the list of social network providers that will never be loaded by the Outlook Social Connector.  \n\nIf you enable this policy setting, social network providers added to the list will never be loaded by the Outlook Social Connector.  This list needs to be semi-colon delimited. \n\nIf you disable or you do not configure this policy setting, the Outlook Social Connector can load any provider specified by the user.","supportedPlatforms":["Windows"],"tags":["Outlook Social Connector","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_BlockSpecificSocialNetworkproviders;L_BlockSpecificSocialNetworkprovidersID","uniqueId":3791,"displayName":"Separate ProgIDs with semi-colons","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to specify the list of social network providers that will never be loaded by the Outlook Social Connector.  \n\nIf you enable this policy setting, social network providers added to the list will never be loaded by the Outlook Social Connector.  This list needs to be semi-colon delimited. \n\nIf you disable or you do not configure this policy setting, the Outlook Social Connector can load any provider specified by the user.","supportedPlatforms":["Windows"],"tags":["Outlook Social Connector","Microsoft Outlook 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\outlook\\socialconnector","registrySubPath":"disabledproviderslist","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_BlockTrustedZones","uniqueId":3547,"displayName":"Block Trusted Zones","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether pictures from sites in the Trusted Sites security zone are automatically downloaded in Outlook e-mail messages and other items. \n\nIf you enable this policy setting, Outlook does not automatically download content from Web sites in the Trusted sites zone in Internet Explorer. Recipients can choose to download external content on a message-by-message basis. \n\nIf you disable or do not configure this policy setting, Outlook automatically downloads content from Web sites in the Trusted sites zone in Internet Explorer.","supportedPlatforms":["Windows"],"tags":["Automatic Picture Download Settings","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"trustedzone","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_CachedExchangelowbandwidththreshold","uniqueId":3614,"displayName":"Cached Exchange low bandwidth threshold","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_CachedExchangelowbandwidththreshold;L_Enterthebitratekbps128k128thresholdtodetectlowbandwidth2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the bit rate threshold value. If the bit rate of the active network connection is below this value, Outlook identifies the network connection as a \"slow\" connection and operates accordingly (for example, downloading headers instead of full messages).","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_CachedExchangelowbandwidththreshold;L_Enterthebitratekbps128k128thresholdtodetectlowbandwidth2","uniqueId":3613,"displayName":"(0 - 1,000,000 kbps)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":1000000},"dataType":"Integer"},"description":"Specifies the bit rate threshold value. If the bit rate of the active network connection is below this value, Outlook identifies the network connection as a \"slow\" connection and operates accordingly (for example, downloading headers instead of full messages).","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\rpc","registrySubPath":"slowbitrate","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_CachedExchangeModeFileCachedExchangeMode","uniqueId":3563,"displayName":"Cached Exchange Mode (File | Cached Exchange Mode)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_CachedExchangeModeFileCachedExchangeMode;L_SelectCachedExchangeModefornewprofiles","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the default Cached Exchange Mode for new profiles and disables the download options in the Cached Exchange Mode command submenu in the File menu.","supportedPlatforms":["Windows"],"tags":["Cached Exchange Mode","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_CachedExchangeModeFileCachedExchangeMode;L_SelectCachedExchangeModefornewprofiles","uniqueId":3562,"displayName":"Select Cached Exchange Mode for new profiles","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Download Headers","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Download Full Items","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Download Headers and then Full Items","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Specifies the default Cached Exchange Mode for new profiles and disables the download options in the Cached Exchange Mode command submenu in the File menu.","supportedPlatforms":["Windows"],"tags":["Cached Exchange Mode","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\cached mode","registrySubPath":"cachedexchangemode","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_CachedExchangeModeSyncSlider","uniqueId":3573,"displayName":"Cached Exchange Mode Sync Settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_CachedExchangeModeSyncSlider;L_SelectCachedExchangeModeSyncSettings","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the amount (by date) of user email Outlook synchronizes locally using Cached Exchange Mode.\n\nIf you enable this policy setting, you can specify the time-window of email messages that Outlook synchronizes to users' computers. The options you can select are: 3 days, 1 week, 2 weeks, 1 month, 3 months, 6 months, 1 year, 2 years, 3 years, 5 years, and All.\n\nIf you disable or do not configure this policy setting, Outlook synchronizes the last 12 months of email messages to users' computers.","supportedPlatforms":["Windows"],"tags":["Cached Exchange Mode","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_CachedExchangeModeSyncSlider;L_SelectCachedExchangeModeSyncSettings","uniqueId":3572,"displayName":"Select Cached Exchange Mode sync settings for profiles","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Three days","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"One week","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Two weeks","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"One month","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Three months","description":"","tags":[],"dependencyGroup":null},{"value":6,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Six months","description":"","tags":[],"dependencyGroup":null},{"value":12,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"One year","description":"","tags":[],"dependencyGroup":null},{"value":24,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Two years","description":"","tags":[],"dependencyGroup":null},{"value":36,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Three years","description":"","tags":[],"dependencyGroup":null},{"value":60,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Five years","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"All","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":12,"description":"This policy setting allows you to configure the amount (by date) of user email Outlook synchronizes locally using Cached Exchange Mode.\n\nIf you enable this policy setting, you can specify the time-window of email messages that Outlook synchronizes to users' computers. The options you can select are: 3 days, 1 week, 2 weeks, 1 month, 3 months, 6 months, 1 year, 2 years, 3 years, 5 years, and All.\n\nIf you disable or do not configure this policy setting, Outlook synchronizes the last 12 months of email messages to users' computers.","supportedPlatforms":["Windows"],"tags":["Cached Exchange Mode","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\cached mode","registrySubPath":"syncwindowsetting","registryType":"REG_DWORD","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\cached mode","registrySubPath":"syncwindowsettingdays","enforcedValues":{"three days":3,"one week":7,"two weeks":14,"one month":0,"three months":0,"six months":0,"one year":0,"two years":0,"three years":0,"five years":0,"all":0}}]}}},{"id":"outlk16;L_CacheOthersMail","uniqueId":3201,"displayName":"Disable shared mail folder caching","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control the caching of shared mail folders.\n\nIf you enable this policy setting, Outlook will only cache shared non-mail folders.\n\nIf you disable or do not configure this policy setting, shared mail and non-mail folders you have access to are cached in your .ost file when you add another mailbox to your profile.","supportedPlatforms":["Windows"],"tags":["Delegates","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\cached mode","registrySubPath":"cacheothersmail","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_CalendarFolderHomePage","uniqueId":3670,"displayName":"Calendar Folder Home Page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_CalendarFolderHomePage;L_showassociatedwebpage42","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_CalendarFolderHomePage;L_urladdressofassociatedwebpage43","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_CalendarFolderHomePage;L_turnoffinternetexplorersecuritychecksforthiswebpage44","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Calendar Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_CalendarFolderHomePage;L_showassociatedwebpage42","uniqueId":3667,"displayName":"Show associated web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Calendar Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\calendar","registrySubPath":"show","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_CalendarFolderHomePage;L_turnoffinternetexplorersecuritychecksforthiswebpage44","uniqueId":3669,"displayName":"Turn off Windows Internet Explorer security checks for this web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Calendar Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\calendar","registrySubPath":"security","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_CalendarFolderHomePage;L_urladdressofassociatedwebpage43","uniqueId":3668,"displayName":"URL address of associated web page:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Calendar Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\calendar","registrySubPath":"url","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_Calendaritemdefaults","uniqueId":3322,"displayName":"Calendar item defaults","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Calendaritemdefaults;L_Showremindersxminutesbeforetheeventstarts","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value in the option \"Default reminder\".","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Calendaritemdefaults;L_Showremindersxminutesbeforetheeventstarts","uniqueId":3321,"displayName":"Show reminders <x> minutes before the event starts:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":2880},"dataType":"Integer"},"description":"Sets the value in the option \"Default reminder\".","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"reminddefault","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Calendarweeknumbers","uniqueId":3332,"displayName":"Calendar week numbers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, week numbers are not shown in the Date Navigator in the Calendar. You can change this behavior to show week numbers in the Date Navigator by enabling this setting.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"weeknum","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Changectrlentershortcutbehavior","uniqueId":3217,"displayName":"Change CTRL+ENTER shortcut behavior","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Changectrlentershortcutbehavior;L_ChangectrlentershortcutbehaviorID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls whether CTRL+ENTER can be used as a shortcut to send an email message.  You can change this behavior so that CTRL+ENTER does not send an email message.\n\nIf you enable this policy setting, you may select one of these choices:\n-  CTRL+Enter is not a shortcut for sending a message\n-  CTRL+Enter is a shortcut for sending a message\n-  CTRL+Enter displays a prompt\n\nIf you disable or do not configure this policy setting, users can use CTRL+ENTER to send an e-mail message.  By default, users are prompted the first time they use the shortcut to confirm sending the message.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Changectrlentershortcutbehavior;L_ChangectrlentershortcutbehaviorID","uniqueId":3216,"displayName":"Change CTRL+ENTER shortcut behavior","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"CTRL+Enter is not a shortcut for sending a message","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"CTRL+Enter is a shortcut for sending a message","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"CTRL+Enter displays a prompt","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":2,"description":"This policy setting controls whether CTRL+ENTER can be used as a shortcut to send an email message.  You can change this behavior so that CTRL+ENTER does not send an email message.\n\nIf you enable this policy setting, you may select one of these choices:\n-  CTRL+Enter is not a shortcut for sending a message\n-  CTRL+Enter is a shortcut for sending a message\n-  CTRL+Enter displays a prompt\n\nIf you disable or do not configure this policy setting, users can use CTRL+ENTER to send an e-mail message.  By default, users are prompted the first time they use the shortcut to confirm sending the message.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"ctrlentersends","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ChangelimitMIMEbody","uniqueId":3723,"displayName":"Change the limit for the number of MIME body parts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_ChangelimitMIMEbody;L_empty75","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"By default, the limit is 250 for the number of MIME body parts when an e-mail message is converted from MIME to MAPI. The number can be set to any positive integer. This helps prevent scenarios in which Outlook hangs while attempting conversion.","supportedPlatforms":["Windows"],"tags":["MIME to MAPI Conversion","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_ChangelimitMIMEbody;L_empty75","uniqueId":3722,"displayName":"%\n      ","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":99999},"dataType":"Integer"},"description":"By default, the limit is 250 for the number of MIME body parts when an e-mail message is converted from MIME to MAPI. The number can be set to any positive integer. This helps prevent scenarios in which Outlook hangs while attempting conversion.","supportedPlatforms":["Windows"],"tags":["MIME to MAPI Conversion","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"mimebodies","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Changelimitrecipients","uniqueId":3719,"displayName":"Change the limit for the number of recipients","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Changelimitrecipients;L_empty73","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"By default, the limit is 12288 recipients included for an e-mail message when the message is converted from MIME to MAPI. The number can be set to any positive integer. This helps prevent scenarios in which Outlook hangs while attempting conversion.","supportedPlatforms":["Windows"],"tags":["MIME to MAPI Conversion","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Changelimitrecipients;L_empty73","uniqueId":3718,"displayName":"Change the limit for the number of recipients","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":99999},"dataType":"Integer"},"defaultValue":"12288","description":"By default, the limit is 12288 recipients included for an e-mail message when the message is converted from MIME to MAPI. The number can be set to any positive integer. This helps prevent scenarios in which Outlook hangs while attempting conversion.","supportedPlatforms":["Windows"],"tags":["MIME to MAPI Conversion","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"maxnumrecipients","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Changethelimitforthenumberof","uniqueId":3715,"displayName":"Change the limit for the number of nested embedded messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Changethelimitforthenumberof;L_empty71","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"By default, the limit is 50 embedded messages when an e-mail message is converted from MIME to MAPI. The number can be set to any positive integer. This helps prevent scenarios in which Outlook hangs while attempting conversion.","supportedPlatforms":["Windows"],"tags":["MIME to MAPI Conversion","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Changethelimitforthenumberof;L_empty71","uniqueId":3714,"displayName":"Change the limit for the number of nested embedded messages","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":99999},"dataType":"Integer"},"defaultValue":"50","description":"By default, the limit is 50 embedded messages when an e-mail message is converted from MIME to MAPI. The number can be set to any positive integer. This helps prevent scenarios in which Outlook hangs while attempting conversion.","supportedPlatforms":["Windows"],"tags":["MIME to MAPI Conversion","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"embeddedmessagelimit","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ChangethelimitFriendlyName","uniqueId":3717,"displayName":"Change the limit for the number of characters in Friendly Name","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_ChangethelimitFriendlyName;L_empty72","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"By default, the limit is 1000 characters for Friendly Name when an e-mail message is converted from MIME to MAPI. The number can be set to any positive integer. This helps prevent scenarios in which Outlook hangs while attempting conversion.","supportedPlatforms":["Windows"],"tags":["MIME to MAPI Conversion","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_ChangethelimitFriendlyName;L_empty72","uniqueId":3716,"displayName":"Change the limit for the number of characters in Friendly Name","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":99999},"dataType":"Integer"},"defaultValue":"1000","description":"By default, the limit is 1000 characters for Friendly Name when an e-mail message is converted from MIME to MAPI. The number can be set to any positive integer. This helps prevent scenarios in which Outlook hangs while attempting conversion.","supportedPlatforms":["Windows"],"tags":["MIME to MAPI Conversion","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"friendlynamelimit","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ChangethelimitMIMEheaders","uniqueId":3721,"displayName":"Change the limit for the number of MIME headers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_ChangethelimitMIMEheaders;L_empty74","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"By default, the limit is 20000 for the number of MIME headers when an e-mail message is converted from MIME to MAPI. The number can be set to any positive integer. This helps prevent scenarios in which Outlook hangs while attempting conversion.","supportedPlatforms":["Windows"],"tags":["MIME to MAPI Conversion","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_ChangethelimitMIMEheaders;L_empty74","uniqueId":3720,"displayName":"Change the limit for the number of MIME headers","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":99999},"dataType":"Integer"},"defaultValue":"20000","description":"By default, the limit is 20000 for the number of MIME headers when an e-mail message is converted from MIME to MAPI. The number can be set to any positive integer. This helps prevent scenarios in which Outlook hangs while attempting conversion.","supportedPlatforms":["Windows"],"tags":["MIME to MAPI Conversion","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"mimeheaders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_CheckForgottenAttachments","uniqueId":3819,"displayName":"Attachment Reminder Options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting governs the enabling or disabling of the Attachment Reminder feature in Outlook.\n\nIf you enable or do not configure this policy setting, when a user sends an email, Outlook looks for any references to attachments in the email, and if no attachments are found, displays a dialog box to alert the user.\n\nIf you disable this policy setting, Outlook does not check for any references to attachments, and the Attachment Reminder dialog box does not pop up.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\mailsettings","registrySubPath":"checkforgottenattachments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ConfigureAddInTrustLevel","uniqueId":3496,"displayName":"Configure Add-In Trust Level","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_ConfigureAddInTrustLevel;L_empty28","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"All installed trusted COM addins can be trusted.  Exchange Settings for the addins still override if present and this option is selected.","supportedPlatforms":["Windows"],"tags":["Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_ConfigureAddInTrustLevel;L_empty28","uniqueId":3495,"displayName":"Configure Add-In Trust Level","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Trust all, or use Exchange settings if present","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Trust all loaded and installed COM addins","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do NOT trust loaded and installed COM addins","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"All installed trusted COM addins can be trusted.  Exchange Settings for the addins still override if present and this option is selected.","supportedPlatforms":["Windows"],"tags":["Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"addintrust","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ConfigureCachedExchangeMode","uniqueId":3554,"displayName":"Use Cached Exchange Mode for new and existing Outlook profiles","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, users can choose to configure Cached Exchange Mode or use Online mode. By enabling this setting, new and existing Outlook profiles are configured to use Cached Exchange Mode. Disabling this setting configures new and existing Outlook profiles to use Online mode.","supportedPlatforms":["Windows"],"tags":["Cached Exchange Mode","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\cached mode","registrySubPath":"enable","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ConfigureCrossFolderContentInConversationView","uniqueId":3214,"displayName":"Configure Cross Folder Content in conversation view","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_ConfigureCrossFolderContentInConversationView;L_ConfigureCrossFolderContentInConversationViewDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls how conversation view in Outlook is loaded and whether Cross Folder Content is turned on or off.\n\nIf you enable this policy setting, you may choose one of these options:\n\n- On and cross-store (default): Cross Folder Content is on and cross-store.  Data will be pulled from all connected data files whether they are cached or online. \n- Off: Cross Folder Content is turned off.\n- On and current: Cross Folder Content is on, but data is only pulled from the current data file.  \n- On and local: Cross Folder Content is on, but data is only pulled from the current data file and any other local data files.\n\nIf you disable or do not configure this policy setting, Cross Folder Content will be turned on and pulled from all connected data files.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_ConfigureCrossFolderContentInConversationView;L_ConfigureCrossFolderContentInConversationViewDropID","uniqueId":3213,"displayName":"Configure Cross Folder Content in conversation view","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"On and cross-store (default)","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Off","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"On and current","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"On and local","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls how conversation view in Outlook is loaded and whether Cross Folder Content is turned on or off.\n\nIf you enable this policy setting, you may choose one of these options:\n\n- On and cross-store (default): Cross Folder Content is on and cross-store.  Data will be pulled from all connected data files whether they are cached or online. \n- Off: Cross Folder Content is turned off.\n- On and current: Cross Folder Content is on, but data is only pulled from the current data file.  \n- On and local: Cross Folder Content is on, but data is only pulled from the current data file and any other local data files.\n\nIf you disable or do not configure this policy setting, Cross Folder Content will be turned on and pulled from all connected data files.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\conversations","registrySubPath":"crossfoldercontent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ConfigureFastShutdownBehaviorForAddIns","uniqueId":3731,"displayName":"Configure fast shutdown behavior for add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls Outlook's \"fast shutdown\" behavior for add-ins.\n\nIf you enable this policy setting, the BeginShutdown and OnDisconnection events should always be called for all add-ins.  \n\nIf you disable or do not configure this policy setting, all Outlook addins should always use the Addin Fast Shutdown behavior and not have the BeginShutdown and OnDisconnection events called.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\shutdown","registrySubPath":"addinfastshutdownbehavior","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ConfigureFastShutdownBehavior","uniqueId":3730,"displayName":"Configure fast shutdown behavior","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_ConfigureFastShutdownBehavior;L_ConfigureFastShutdownBehaviorDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls Outlook's \"fast shutdown\" behavior.  \n\nIf you enable this policy setting, you may select one of these options:\n\n- MAPI provider does not support: Outlook should always use Fast Shutdown unless a MAPI provider explicitly does not support it.\n- All MAPI providers support: Outlook only uses Fast Shutdown if all MAPI providers do support it.\n- Never: Outlook never uses Fast Shutdown\n\nIf you disable or do not configure this policy setting, the behavior will be the same as the \"MAPI provider does not support\" option.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Miscellaneous","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_ConfigureFastShutdownBehavior;L_ConfigureFastShutdownBehaviorDropID","uniqueId":3729,"displayName":"Configure fast shutdown behavior","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"MAPI provider does not support","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"All MAPI providers support","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Never","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls Outlook's \"fast shutdown\" behavior.  \n\nIf you enable this policy setting, you may select one of these options:\n\n- MAPI provider does not support: Outlook should always use Fast Shutdown unless a MAPI provider explicitly does not support it.\n- All MAPI providers support: Outlook only uses Fast Shutdown if all MAPI providers do support it.\n- Never: Outlook never uses Fast Shutdown\n\nIf you disable or do not configure this policy setting, the behavior will be the same as the \"MAPI provider does not support\" option.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Miscellaneous","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\shutdown","registrySubPath":"fastshutdownbehavior","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ContactsFolderHomePage","uniqueId":3674,"displayName":"Contacts Folder Home Page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_ContactsFolderHomePage;L_showassociatedwebpage45","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_ContactsFolderHomePage;L_urladdressofassociatedwebpage46","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_ContactsFolderHomePage;L_turnoffinternetexplorersecuritychecksforthiswebpage47","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Contacts Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_ContactsFolderHomePage;L_showassociatedwebpage45","uniqueId":3671,"displayName":"Show associated web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Contacts Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\contacts","registrySubPath":"show","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_ContactsFolderHomePage;L_turnoffinternetexplorersecuritychecksforthiswebpage47","uniqueId":3673,"displayName":"Turn off Windows Internet Explorer security checks for this web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Contacts Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\contacts","registrySubPath":"security","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_ContactsFolderHomePage;L_urladdressofassociatedwebpage46","uniqueId":3672,"displayName":"URL address of associated web page:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Contacts Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\contacts","registrySubPath":"url","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_ControlCalendarSharing","uniqueId":3316,"displayName":"Control Calendar Sharing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_ControlCalendarSharing;L_controlcalendarsharing5","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"By default, users can share an entire calendar by saving it in the iCalendar format, or share a snapshot of a calendar by using e-mail. This setting allows you to specify the detail level in the shared versions of calendars, or to disable sharing of calendars.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_ControlCalendarSharing;L_controlcalendarsharing5","uniqueId":3315,"displayName":"Control Calendar Sharing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":32768,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prevent Calendar Sharing","description":"","tags":[],"dependencyGroup":null},{"value":16384,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow calendar sharing with 'Availability Only' detail level","description":"","tags":[],"dependencyGroup":null},{"value":8192,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow calendar sharing with 'Availability Only' and 'Limited Details' detail level","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":32768,"description":"By default, users can share an entire calendar by saving it in the iCalendar format, or share a snapshot of a calendar by using e-mail. This setting allows you to specify the detail level in the shared versions of calendars, or to disable sharing of calendars.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"payloadcalendardetailspolicy","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DefaultlocationforOSTfiles","uniqueId":3753,"displayName":"Default location for OST files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_DefaultlocationforOSTfiles;L_DefaultlocationforOSTfilesPart","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a different folder location for Outlook Data File (OST) files on user computers. \n\nIf you enable this policy setting, you can specify a location for OST files on user computers.\n\nIf you disable or do not configure this policy setting, OST files are located in: %LOCALAPPDATA%\\Microsoft\\Outlook on user computers.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_DefaultlocationforOSTfiles;L_DefaultlocationforOSTfilesPart","uniqueId":3752,"displayName":"Default location for OST files","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a different folder location for Outlook Data File (OST) files on user computers. \n\nIf you enable this policy setting, you can specify a location for OST files on user computers.\n\nIf you disable or do not configure this policy setting, OST files are located in: %LOCALAPPDATA%\\Microsoft\\Outlook on user computers.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook","registrySubPath":"forceostpath","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_DefaultlocationforPSTfiles","uniqueId":3751,"displayName":"Default location for PST files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_DefaultlocationforPSTfiles;L_defaultlocationforpstfiles79","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a different folder location for Outlook Data File (PST) files on user computers. \n\nIf you enable this policy setting, you can specify a location for PST files on user computers.\n\nIf you disable or do not configure this policy setting, PST files are located in: %USERPROFILE%\\Documents\\Outlook Files\\ on user computers.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_DefaultlocationforPSTfiles;L_defaultlocationforpstfiles79","uniqueId":3750,"displayName":"Default location for PST files","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a different folder location for Outlook Data File (PST) files on user computers. \n\nIf you enable this policy setting, you can specify a location for PST files on user computers.\n\nIf you disable or do not configure this policy setting, PST files are located in: %USERPROFILE%\\Documents\\Outlook Files\\ on user computers.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook","registrySubPath":"forcepstpath","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_DefaultRecurrenceDuration","uniqueId":3359,"displayName":"Specify total number of days in a recurring meeting or appointment","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_DefaultRecurrenceDuration;L_DefaultRecurrenceDurationSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the default number of days after which a recurring meeting or appointment (but not a task) ends.\n\nIf you enable this policy setting, the “End by” setting is the default setting for recurring meetings and appointments, and the “End by” value is set to the specified number of days after today’s date. For example, if you specify a value of 180 and today's date is May 5, 2011, the “End by” value is November 1, 2011 (180 days after today’s date).\n\nIf you disable or do not configure this policy setting, the “No end date” option is the default setting for recurring meetings and appointments.","supportedPlatforms":["Windows"],"tags":["Recurring item configuration","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_DefaultRecurrenceDuration;L_DefaultRecurrenceDurationSpinID","uniqueId":3358,"displayName":"End recurrence after x days","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":2,"maximum":720},"dataType":"Integer"},"defaultValue":"180","description":"This policy setting allows you to specify the default number of days after which a recurring meeting or appointment (but not a task) ends.\n\nIf you enable this policy setting, the “End by” setting is the default setting for recurring meetings and appointments, and the “End by” value is set to the specified number of days after today’s date. For example, if you specify a value of 180 and today's date is May 5, 2011, the “End by” value is November 1, 2011 (180 days after today’s date).\n\nIf you disable or do not configure this policy setting, the “No end date” option is the default setting for recurring meetings and appointments.","supportedPlatforms":["Windows"],"tags":["Recurring item configuration","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"recurrencesdefault","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DefaultRSSfeeds","uniqueId":3628,"displayName":"Default RSS Feeds","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_DefaultRSSfeeds;L_DefaultRSSSubscriptionsPart","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to deploy default RSS Feeds by providing a list of URLs that point to content that is syndicated through RSS.  Outlook reads the list when it starts, and the corresponding RSS Feeds are added to each of the user's profiles.  By default, users are not subscribed to any RSS Feeds.\n\nIf you enable this policy setting, you may specify the URLs in the format: feed://<subscription URL>, where \"feed://\" replaces \"http://\".  This ensures that the URL is parsed as an RSS XML file in Outlook.\n\nIf you disable or do not configure this policy setting, users are not subscribed to any RSS Feeds.","supportedPlatforms":["Windows"],"tags":["RSS Feeds","Account Settings","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_DefaultRSSfeeds;L_DefaultRSSSubscriptionsPart","uniqueId":3627,"displayName":"List of default RSS Feeds","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to deploy default RSS Feeds by providing a list of URLs that point to content that is syndicated through RSS.  Outlook reads the list when it starts, and the corresponding RSS Feeds are added to each of the user's profiles.  By default, users are not subscribed to any RSS Feeds.\n\nIf you enable this policy setting, you may specify the URLs in the format: feed://<subscription URL>, where \"feed://\" replaces \"http://\".  This ensures that the URL is parsed as an RSS XML file in Outlook.\n\nIf you disable or do not configure this policy setting, users are not subscribed to any RSS Feeds.","supportedPlatforms":["Windows"],"tags":["RSS Feeds","Account Settings","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\accounts","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_DefaultserversanddataforMeetingWorkspaces;L_DefaultServer","uniqueId":3711,"displayName":"Default server:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Using this policy, you can define default servers and server data for Meeting Workspaces. It is recommended that you draft this policy in a text editor and paste it into the text box in the setting. You can add up to five servers by listing them in the \"Default server:\" text box. Each server is defined by a pipe-delimited list, with a total of six pipes per server record. The OrganizerName field is left blank. For example: http://server1 | Friendly name for server1 | templateLCID | templateID | TemplateName | OrganizerName | http://server2 | ... and so on. For more information, see the Office 2016 Resource Kit on TechNet.","supportedPlatforms":["Windows"],"tags":["Meeting Workspace","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\meetings\\profile","registrySubPath":"mruinternal","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_DefaultserversanddataforMeetingWorkspaces","uniqueId":3712,"displayName":"Default servers and data for Meeting Workspaces","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_DefaultserversanddataforMeetingWorkspaces;L_DefaultServer","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Using this policy, you can define default servers and server data for Meeting Workspaces. It is recommended that you draft this policy in a text editor and paste it into the text box in the setting. You can add up to five servers by listing them in the \"Default server:\" text box. Each server is defined by a pipe-delimited list, with a total of six pipes per server record. The OrganizerName field is left blank. For example: http://server1 | Friendly name for server1 | templateLCID | templateID | TemplateName | OrganizerName | http://server2 | ... and so on. For more information, see the Office 2016 Resource Kit on TechNet.","supportedPlatforms":["Windows"],"tags":["Meeting Workspace","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_DefaultSharePointlists","uniqueId":3641,"displayName":"Default SharePoint lists","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_DefaultSharePointlists;L_empty35","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to deploy SharePoint lists.\n\nIf you enable this policy setting, you can provide a list of SharePoint list URLs in the following format:\n\nValue name: SPsite1\nValue: SPsite1 stssync:// URL. See MS-STSSYN for documentation.\n\nValue name: SPSite2\nValue: SPsite2 stssync:// URL. See MS-STSSYN for documentation.\n\nThe list of URLs provided is read when Outlook starts up, and the corresponding SharePoint lists are added to each of the user's profiles.\n\nIf you disable or do not configure this policy setting, users will not have any default SharePoint lists.","supportedPlatforms":["Windows"],"tags":["SharePoint Lists","Account Settings","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_DefaultSharePointlists;L_empty35","uniqueId":3640,"displayName":"Default SharePoint lists","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to deploy SharePoint lists.\n\nIf you enable this policy setting, you can provide a list of SharePoint list URLs in the following format:\n\nValue name: SPsite1\nValue: SPsite1 stssync:// URL. See MS-STSSYN for documentation.\n\nValue name: SPSite2\nValue: SPsite2 stssync:// URL. See MS-STSSYN for documentation.\n\nThe list of URLs provided is read when Outlook starts up, and the corresponding SharePoint lists are added to each of the user's profiles.\n\nIf you disable or do not configure this policy setting, users will not have any default SharePoint lists.","supportedPlatforms":["Windows"],"tags":["SharePoint Lists","Account Settings","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\accounts","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_DefaultWebCalsubscriptions","uniqueId":3637,"displayName":"Default Internet Calendar subscriptions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_DefaultWebCalsubscriptions;L_empty32","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to deploy Internet Calendar subscriptions.\n\nIf you enable this policy setting, the URLs listed here will be read and the corresponding Internet Calendar subscriptions will be added to each of the user's profiles.  The name you specify here will not be used as the name of the Internet Calendar subscription.\n\nIf you disable or do not configure this policy setting users will not have any default Internet Calendar subscriptions.","supportedPlatforms":["Windows"],"tags":["Internet Calendars","Account Settings","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_DefaultWebCalsubscriptions;L_empty32","uniqueId":3636,"displayName":"Default Internet Calendar subscriptions","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to deploy Internet Calendar subscriptions.\n\nIf you enable this policy setting, the URLs listed here will be read and the corresponding Internet Calendar subscriptions will be added to each of the user's profiles.  The name you specify here will not be used as the name of the Internet Calendar subscription.\n\nIf you disable or do not configure this policy setting users will not have any default Internet Calendar subscriptions.","supportedPlatforms":["Windows"],"tags":["Internet Calendars","Account Settings","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\accounts","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_DefinecustomlabelforSharePointstore","uniqueId":3643,"displayName":"Define custom label for SharePoint store","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_DefinecustomlabelforSharePointstore;L_DefinecustomlabelforSharePointstorePart","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"You can use this setting to define a custom label for the SharePoint Lists PST and most other places where the term \"SharePoint\" is used in Outlook. (Setting this value replaces the word \"SharePoint\" in Outlook strings with the value you specify.) A custom label might be particularly useful when deploying a third-party server that supports the same Microsoft SharePoint Foundation Web services Outlook uses for synchronization.","supportedPlatforms":["Windows"],"tags":["SharePoint Lists","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_DefinecustomlabelforSharePointstore;L_DefinecustomlabelforSharePointstorePart","uniqueId":3642,"displayName":"Enter custom label for SharePoint store:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"You can use this setting to define a custom label for the SharePoint Lists PST and most other places where the term \"SharePoint\" is used in Outlook. (Setting this value replaces the word \"SharePoint\" in Outlook strings with the value you specify.) A custom label might be particularly useful when deploying a third-party server that supports the same Microsoft SharePoint Foundation Web services Outlook uses for synchronization.","supportedPlatforms":["Windows"],"tags":["SharePoint Lists","Account Settings","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\offline\\options","registrySubPath":"name","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_DelegateSentItemsStyle","uniqueId":3850,"displayName":"Saving messages sent from a shared mailbox to the Sent Items folder","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether messages sent from a shared mailbox are saved to the Sent Items folder of the shared mailbox.\n\nBy default, messages sent from a shared mailbox aren't saved to the Sent Items folder of the shared mailbox.\n\nIf you enable this policy setting, messages sent from a shared mailbox will be saved to the Sent Items folder of the shared mailbox.\n\nIf you disable or don’t configure this policy setting, messages sent from a shared mailbox won’t be saved to the Sent Items folder of the shared mailbox.","supportedPlatforms":["Windows"],"tags":["Delegates","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"delegatesentitemsstyle","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DeletedItemsFolderHomePage","uniqueId":3678,"displayName":"Deleted Items Folder Home Page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_DeletedItemsFolderHomePage;L_showassociatedwebpage48","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_DeletedItemsFolderHomePage;L_urladdressofassociatedwebpage49","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_DeletedItemsFolderHomePage;L_turnoffinternetexplorersecuritychecksforthiswebpage50","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Deleted Items Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_DeletedItemsFolderHomePage;L_showassociatedwebpage48","uniqueId":3675,"displayName":"Show associated web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Deleted Items Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\deleted items","registrySubPath":"show","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_DeletedItemsFolderHomePage;L_turnoffinternetexplorersecuritychecksforthiswebpage50","uniqueId":3677,"displayName":"Turn off Windows Internet Explorer security checks for this web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Deleted Items Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\deleted items","registrySubPath":"security","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_DeletedItemsFolderHomePage;L_urladdressofassociatedwebpage49","uniqueId":3676,"displayName":"URL address of associated web page:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Deleted Items Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\deleted items","registrySubPath":"url","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_DeletemeetingrequestfromInboxwhenresponding","uniqueId":3278,"displayName":"Delete meeting request from Inbox when responding","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_DeletemeetingrequestfromInboxwhenresponding;L_DeletemeetingrequestfromInboxwhenresponding","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value for the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["When sending a message","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_DeletemeetingrequestfromInboxwhenresponding;L_DeletemeetingrequestfromInboxwhenresponding","uniqueId":3277,"displayName":"Delete meeting request from Inbox when responding","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the value for the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["When sending a message","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"deletewhenrespond","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DetermineOrderOfSourcesForPhotos","uniqueId":3360,"displayName":"Determine order of sources for photos","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls the order of sources for photos displayed in Outlook.  \n\nIf you enable this policy setting, Outlook will first look at the OAB/AD for the user photo.  If this is not available, Outlook will show a Contact photo if the Contact photo is available.\n\nIf you disable or do not configure this policy setting, Outlook will first look into the Contact Address Books for the user photo.  If this is not available, Outlook will look to the OAB/AD if available.","supportedPlatforms":["Windows"],"tags":["Contact Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook","registrySubPath":"preferadphotos","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableAddinLogging","uniqueId":3777,"displayName":"Disable Windows event logging for Outlook add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting governs logging of connected add-ins to the Windows event log.\n\nIf you enable this policy setting, an inventory of connected Outlook add-ins will not be written to the Windows event log.\n\nIf you disable or do not configure this policy setting, an inventory of connected Outlook add-ins will be written to the Windows event log.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\logging","registrySubPath":"disableaddinlogging","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableAdminNotifications","uniqueId":3848,"displayName":"Disable Outlook tenant admin notifications","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines if tenant admins can receive support notifications in Outlook.\n\nDefault (0): Tenant admins who are signed in will receive status updates about potential issues and fixes that are impacting their tenant.\n\nIf you enable this setting, tenant admins who are signed in won't receive status updates about potential issues and fixes that are impacting their tenant.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"disableadminnotifications","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableAttachmentPreviewing","uniqueId":3215,"displayName":"Do not allow attachment previewing in Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook users can preview attachments in e-mail messages. \n\nIf you enable this policy setting, users cannot preview attachments within Outlook. Users must instead use the appropriate application to view attachments, depending on security settings. This configuration can be used to guard against theoretical future zero-day attacks that target specific file types. \n\nIf you disable or do not configure this policy setting, Outlook users can preview certain types of e-mail attachments within the message window or Reading Pane by clicking the icon that represents the attachment. Users can preview Outlook items, Word documents, PowerPoint presentations, Excel worksheets, Microsoft Visio® drawings, image files, and text files. To help protect users from malicious code, active content embedded in attachments (including scripts, macros, and ActiveX controls) is disabled during a preview.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"disableattachmentpreviewing","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableAutoPreview","uniqueId":3227,"displayName":"Disable AutoPreview","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Enabling this policy permanently disables the item preview. Users cannot turn it back on and the ribbon UI to change it is disabled.","supportedPlatforms":["Windows"],"tags":["Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"disableautopreview","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableCalendarSearchAgendaView","uniqueId":3306,"displayName":"Do not allow Calendar search agenda view","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to prevent agenda view for Calendar search.\n\nIf you enable this policy setting, Calendar search will default to list view.\n\nIf you disable or do not configure this policy setting, it will default to agenda view.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"disablecalendarsearchagendaview","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Disablechangingfolderpermissions","uniqueId":3599,"displayName":"Do not allow users to change permissions on folders","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting prevents users from changing their mail folder permissions. \n\nIf you enable this policy setting, Outlook users cannot change permissions on folders; the settings on the Permissions tab are disabled. Enabling this policy setting does not affect existing permissions, and users can still change permissions by sending a sharing message.\n\nIf you disable or do not configure this policy setting, Outlook users can change the permissions for folders under their control by using the Permissions tab of the Properties dialog box for the folder.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\folders","registrySubPath":"disableeditpermissions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_disablecommandbar38","uniqueId":3652,"displayName":"Disable command bar buttons and menu items","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_disablecommandbar38;L_EnteracommandbarIDtodisable","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable any command bar button and menu item with a command bar ID, including command bar buttons and menu items that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, all default command bar buttons or menu items are available to users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_disablecommandbar38;L_EnteracommandbarIDtodisable","uniqueId":3651,"displayName":"Enter a command bar ID to disable","settingType":{"possibleValues":{"possibleValuesType":"List","ValueType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to disable any command bar button and menu item with a command bar ID, including command bar buttons and menu items that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, all default command bar buttons or menu items are available to users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\disabledcmdbaritemslist","registryPath":"TCID","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_DisableComToWebAddinUpgrade","uniqueId":3833,"displayName":"Disable web add-in installation on migration to new Outlook for Windows","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to disable installation of web add-in equivalents of COM add-ins on the switch to new Outlook. The add-ins available for migration are listed in https://aka.ms/newoutlooksettings.\n\nLearn more about Outlook web add-ins at https://learn.microsoft.com/office/dev/add-ins/outlook/outlook-add-ins-overview.\n\nCOM add-ins do not work in new Outlook for Windows. By default, users in the organization will get the option to install available web add-ins, in place of COM add-ins, when they move from classic Outlook for Windows.\n\nIf you enable this policy setting, users will not get the option to install web add-ins in place of their COM add-ins. \n \nIf you disable or do not configure this policy setting, users will get an option to install web add-ins in place of their COM add-ins.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\addins","registrySubPath":"disablecomtowebupgrade","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableContinuebuttononallEncryptionwarningdialogs","uniqueId":3514,"displayName":"Do not provide Continue option on Encryption warning dialog boxes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This setting controls whether Outlook users are allowed to send e-mail messages after they see an encryption warning. \n\nIf you enable this policy setting, encryption warning dialog boxes do not contain a Continue button, which means that users must cancel the sending operation entirely. \n\nIf you disable or do not configure this policy setting, if Outlook users see an encryption-related dialog box when attempting to send a message, they can choose to dismiss the warning and send the message anyway.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"disablecontinueencryption","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableCrashNotificationOnRestart","uniqueId":3849,"displayName":"Disable the Outlook crash notification when Outlook restarts.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines if the Outlook crash notification on restart is allowed. Enabling this setting will block Outlook crash notification on restart.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"disablecrashnotificationonrestart","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Disabledistributionlistexpansion","uniqueId":3736,"displayName":"Do not expand Contact Groups","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook users can expand Contact Groups when addressing e-mail messages. \n\nIf you enable this policy setting, Outlook users cannot expand Contact Groups. \n\nIf you disable or do not configure this policy setting, when Outlook users add a Contact Group to the To, CC, or BCC fields of an e-mail message or other item, they can expand the Contact Group to see the e-mail addresses of everyone in the group.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"disabledlexpansion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableEditDefaultUserPermissions","uniqueId":3600,"displayName":"Limit which permissions can be assigned to Default, Anonymous, or My Organization on mail folders and calendars","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to limit which permissions can be assigned to Default, Anonymous, or My Organization on mail folders and calendars.\n\nIf you enable this policy setting, users can assign only the following permissions to Default, Anonymous, or My Organization.\n\n- None on mail folders\n- None or basic Free/Busy information on calendars\n\nUsers won't be able to assign any other permissions to Default, Anonymous, or My Organization. All permissions will still be available to assign to other users on mail folders and calendars.\n\nIf you disable or don't configure this policy setting, users can assign any permissions to Default, Anonymous, or My Organization on mail folders and calendars.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\folders","registrySubPath":"disableeditdefaultuserpermissions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableExchangeConsumerAccounts","uniqueId":3820,"displayName":"Prevent personal Microsoft accounts from using MAPI","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting governs whether personal Microsoft accounts can be configured to use MAPI in Outlook.\n\nA personal Microsoft account is an account hosted on Outlook.com, Hotmail.com, Live.com, Msn.com or any variation on those domains.\n\nIf you enable this policy, users won’t be able to configure a personal Microsoft account to use MAPI in Outlook.\n\nThis means that in the Add Account dialog box in Outlook, users must choose “Manual setup or additional server types,” then choose Next, and then choose “POP or IMAP.”\n\nIf you disable or don’t configure this policy setting, users can configure a personal Microsoft account to use MAPI in Outlook. They can do this by choosing “E-mail” account in the Add Account dialog box.\n\nNote that personal Microsoft accounts that are configured to use MAPI will be automatically configured to use Cached Exchange Mode, and this can’t be changed.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook","registrySubPath":"disableexchangeconsumeraccounts","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableFileArchive","uniqueId":3438,"displayName":"Disable File|Archive","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This setting allows you to disable File|Archive and prevent users from manually archiving items in their mailbox.  You might want to set this if you have deployed other messaging records management policies in order to avoid conflicts.  You should also consider disabling AutoArchive in the setting named AutoArchive Settings.","supportedPlatforms":["Windows"],"tags":["AutoArchive","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"disablemanualarchive","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableFolderHomePages","uniqueId":3666,"displayName":"Do not allow Home Page URL to be set in folder Properties","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, users can set a URL to be used as the Home Page for a folder by entering the URL on the Home Page tab on the folder's Properties dialog box. By enabling this setting, you can disallow setting Folder Home Pages for all folders.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview","registrySubPath":"disable","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Disablefolderhomepagesforfoldersinnondefaultstores","uniqueId":3423,"displayName":"Do not allow folders in non-default stores to be set as folder home pages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, creating folder home pages for folders in non-default stores is blocked; you cannot define a folder home page for a folder that is in a non-default store. This setting allows you to unblock folder home pages for folders in non-default stores. Note that other settings might still prevent folder home pages from functioning.","supportedPlatforms":["Windows"],"tags":["Advanced","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"nondefaultstorescript","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Disableformregions","uniqueId":3725,"displayName":"Configure form regions permissions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Disableformregions;L_DisableformregionsPart","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"By default, all form region customizations are permitted to run in Outlook. By using this setting, you can disable all form region customizations, or specify that form regions must be registered on a per-computer basis, rather than a per-user basis.","supportedPlatforms":["Windows"],"tags":["Form Region Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Disableformregions;L_DisableformregionsPart","uniqueId":3724,"displayName":"Configure form regions permissions:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"All form regions are allowed to run","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow only those registered in HKLM","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No form regions are allowed to run","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"By default, all form region customizations are permitted to run in Outlook. By using this setting, you can disable all form region customizations, or specify that form regions must be registered on a per-computer basis, rather than a per-user basis.","supportedPlatforms":["Windows"],"tags":["Form Region Settings","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\addins","registrySubPath":"disableformregions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableGuessSmart","uniqueId":3844,"displayName":"Disable GuessSmart in Outlook.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether GuessSmart will be used to configure an account.\n\nIf you enable this policy setting, GuessSmart will not be used to configure an account.","supportedPlatforms":["Windows"],"tags":["Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\setup","registrySubPath":"disableguesssmart","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Disablehithighlighting","uniqueId":3208,"displayName":"Do not display hit highlights in search results","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, hit highlights are included in search results. Enable this setting to turn off search hit highlighting.","supportedPlatforms":["Windows"],"tags":["Search Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\search","registrySubPath":"disablehithighlighting","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableHybridSearch","uniqueId":3212,"displayName":"Disable Hybrid Searching","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether searches in Cached Exchange Mode can also be run on the Exchange server. This policy does not affect either Online Mode or non-Exchange accounts. \n\nIf you enable this policy setting, Outlook runs searches locally in Cached Exchange Mode and “hybrid” (on the Exchange Server also) modes. It should be noted that if the sync slider is enabled and all mail is not locally cached, you may not see all available results.\n\nIf you disable or do not configure this policy setting, Outlook first runs searches locally, but then allows the user to search on the Exchange server by clicking “More” link at the bottom of searches, or uses the equivalent ribbon button.","supportedPlatforms":["Windows"],"tags":["Search Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\search","registrySubPath":"disablehybrid","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableInfoPathpropertiespromotioninOutlook","uniqueId":3713,"displayName":"Do not promote InfoPath forms properties into Outlook properties","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, InfoPath property promotion is enabled.  This setting allows you to disable the ability to promote InfoPath forms properties into Outlook properties.  This feature allows InfoPath forms to promote properties from the underlying data into named properties in Outlook.  These properties are displayed in views on folders, and users can group, filter, and sort by them.","supportedPlatforms":["Windows"],"tags":["InfoPath Integration","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\infopath","registrySubPath":"msoriddisableinfopathpropertypromotion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Disableinstallationprompts","uniqueId":3204,"displayName":"Prevent installation prompts when Windows Desktop Search component is not present","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to prevent a dialog box from being shown when the Windows Desktop Search 4.0 or above system component is not present on the user's computer and removes the other links provided in Outlook to allow users to download the component. The new search functionality in Outlook requires Windows Desktop Search 4.0 or above.\n\nIf you enable this policy setting, the dialog box is not shown.\n\nIf you disable or do not configure this policy setting, the dialog box is shown when this system component is not present.  Users are prompted with a dialog box when Outlook starts that explains how to download the system component to install on their computers. In addition, other links are provided by default in Outlook to allow users to download the system component. \n\nNote: If the required Windows system component is not available, the buttons in the Outlook Search ribbon tab will be disabled regardless of how this policy setting is configured.","supportedPlatforms":["Windows"],"tags":["Search Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\search","registrySubPath":"disabledownloadsearchprompt","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableInternationalizedDomainNamesIDNinOutlook","uniqueId":3399,"displayName":"Disable Internationalized Domain Names (IDN) in Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, Outlook supports Internationalized Domain Names (IDN) for SMTP addresses in Outlook if Windows provides the appropriate support for this feature. You can disable IDN support so that Punycode rather than native characters are used for rendering SMTP addresses. \n\nYou might choose to disable IDN support in Outlook if you do not typically expect non-ASCII characters in SMTP addresses. \n\nThis setting does not affect the support of IDN in URLs.","supportedPlatforms":["Windows"],"tags":["International Options","Mail Format","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"disableidn","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableMailTips","uniqueId":3229,"displayName":"Disable Mail Tips","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether users can view Mail Tips.\n\t  \nIf you enable this policy setting, Mail Tips do not appear in Outlook.\n\t\t\t\t\t\nIf you disable or do not configure this policy, Mail Tips appear in Outlook.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"disablemailtips","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Disablemeetingregeneration","uniqueId":3319,"displayName":"Do not regenerate meetings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, when a user accepts or tentatively accepts a meeting, Outlook creates a duplicate copy of the meeting with the new response status and a new entry ID.  Outlook then deletes the old version of the meeting from the calendar. This setting allows you to roll back to the legacy behavior and prevent meeting regeneration.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"disablemeetingregeneration","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableNoEndDate","uniqueId":3357,"displayName":"Disable the \"No end date\" option for recurring items","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to disable the \"No end date\" option for the recurrence range in appointments, meetings, and tasks.\n\nIf you enable this policy setting, the “No end date” option is disabled, and the  “End after” recurrence setting is selected and set to “10 occurrences” by default. You can change this default setting by configuring  the “Specify total number of days in a recurring meeting or appointment” policy setting.\n\nIf you disable or do not configure this policy setting, the “No end date” option is enabled and is the default setting for recurring meetings, appointments, and tasks.","supportedPlatforms":["Windows"],"tags":["Recurring item configuration","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"disablerecurnoend","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableOffice365SimplifiedAccountCreation","uniqueId":3836,"displayName":"Prevent Office 365 E-mail accounts from being configured within a simplified Interface","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether an Office 365 E-mail account when being configured in Outlook, can use a simplified dialog that can greatly accelerate the initial account creation.\n\nIf you enable this policy setting, users will configure their Office 365 accounts using the Account Wizard, as they do, for all other account types.","supportedPlatforms":["Windows"],"tags":["E-mail","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\setup","registrySubPath":"disableoffice365simplifiedaccountcreation","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableOnlineModeAuthDiagnostics","uniqueId":3822,"displayName":"Disable online mode for Get Diagnostics.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\n         This policy setting determines whether online mode for Get Diagnostics is allowed. Enabling this setting will block Get Diagnostics feature from sending authentication and diagnostics logs to our service.\n         Users will now go through offline mode. We will collect all the logs and store them in the Downloads folder of the user. This user can contact support and decide if they want to send us the logs. \n      ","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"disableonlinemodeauthdiagnostics","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableOutlookFeedbackFeatures","uniqueId":3841,"displayName":"Disable Outlook features in the Feedback tab under the File menu in Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether Outlook features will be displayed in the Feedback tab under the File menu in Outlook.\n\nIf you enable this policy setting, then Outlook features will not be displayed in the Feedback tab under the File menu in Outlook.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"disableoutlookfeedbackfeatures","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableOutlookMobileHyperlink","uniqueId":3837,"displayName":"Disable Outlook Mobile Hyperlink","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines if the Outlook Mobile Hyperlink is shown in Account Settings.\n\nIf you enable this policy setting, users will be unable to view the Outlook Mobile Hyperlink in Account Settings.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"disableoutlookmobilehyperlink","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableOutlookobjectmodelscripts","uniqueId":3436,"displayName":"Do not allow Outlook object model scripts to run for shared folders","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting controls whether Outlook executes scripts associated with custom forms or folder home pages for shared folders. \n\nIf you enable this policy setting, Outlook cannot execute any scripts associated with shared folders, overriding any configuration changes on users' computers. \n\nIf you disable this policy setting, Outlook will automatically run any scripts associated with custom forms or folder home pages for shared folders. \n\nIf you do not configure this policy setting, the behavior is the equivalent of setting the policy to Enabled.","supportedPlatforms":["Windows"],"tags":["Advanced","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"sharedfolderscript","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableOutlookobjectmodelscriptsforpublicfolders","uniqueId":3437,"displayName":"Do not allow Outlook object model scripts to run for public folders","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting controls whether Outlook executes scripts that are associated with custom forms or folder home pages for public folders.\n\nIf you enable this policy setting, Outlook cannot execute any scripts associated with public folders, overriding any configuration changes on users' computers. \n\nIf you disable this policy setting, Outlook will automatically run any scripts associated with custom forms or folder home pages for public folders, overriding any configuration changes on users' computers. \n\nIf you do not configure this policy setting,  Outlook will not run any scripts associated with public folders by default. Users can configure the setting in the Trust Center by selecting the “Allow script in public folders” check box.","supportedPlatforms":["Windows"],"tags":["Advanced","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"publicfolderscript","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisablePreviewPlace","uniqueId":3821,"displayName":"Disable Preview Place","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether the Preview Place feature is allowed.\n        \n        If you enable this policy setting, you will block the Preview Place feature from being available to your users and they will no longer be able to preview and provide feedback on upcoming changes in Outlook.\n\n        If you disable or don’t configure this policy setting, the Preview Place feature will be available to your users.\n\n\t  Note: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n      ","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"disablepreviewplace","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisablePublishtoGALbutton","uniqueId":3525,"displayName":"Do not display 'Publish to GAL' button","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook users can publish e-mail certificates to the Global Address List (GAL). \n\nIf you enable this policy setting, the \"Publish to GAL\" button does not display in the \"E-mail Security\" section of the Trust Center. \n\nIf you disable or do not configure this policy setting, Outlook users can publish their e-mail certificates to the GAL through the \"E-mail Security\" section of the Trust Center.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"publishtogaldisabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Disablereadingpane","uniqueId":3414,"displayName":"Do not display the reading pane","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, the Reading Pane is enabled only in the mail module and located on the right hand side of the window.  This setting allows you to disable the reading pane.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options","registrySubPath":"disablereadingpane","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableReadingPaneCompose","uniqueId":3818,"displayName":"Disable Reading Pane Compose","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether user’s responses to emails are composed inline on the reading pane or in a new window.\n\nIf you enable this policy setting, responses to emails are composed in new windows.\n\nIf you disable or do not configure this policy setting, responses to emails are composed inline in the reading pane.","supportedPlatforms":["Windows"],"tags":["Compose Messages","Mail","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\message","registrySubPath":"disablereadingpanecompose","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableRememberPasswordcheckboxforInternetEmailsettingsdialo","uniqueId":3499,"displayName":"Disable 'Remember password' for Internet e-mail accounts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Use this option to hide your user's ability to cache passwords locally in the computer's registry. When configured, this policy will hide the 'Remember Password' checkbox and not allow users to have Outlook remember their password. \n\nNote that POP3, IMAP, and HTTP e-mail accounts are all considered Internet e-mail accounts in Outlook. E-mail account options are listed on the Server Type dialog box when users choose 'New' under Tools | Account Settings.","supportedPlatforms":["Windows"],"tags":["Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"enablerememberpwd","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableroamingofInternetCalendars","uniqueId":3633,"displayName":"Disable roaming of Internet Calendars","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, Internet Calendars are available on each client that the users use to connect to their Microsoft Exchange Server mailboxes.  This setting allows you to disable roaming  Internet Calendars.  When roaming is disabled,  Internet Calendars are available only on the client that originally linked them.","supportedPlatforms":["Windows"],"tags":["Internet Calendars","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\webcal","registrySubPath":"disableroaming","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableRoamingofRSSSubscriptions","uniqueId":3622,"displayName":"Do not roam users' RSS Feeds","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to change the default delivery location of RSS Feeds to a local PST.\n\nIf you enable this setting, the default delivery location will be changed to a local PST.  When RSS Feeds are delivered to a local PST, they will not roam from client to client and will only be available on the computer where the user originally subscribed to the RSS Feed.\n\nIf you disable or do not configure this policy setting, subscriptions to RSS Feeds are delivered to the user's mailbox and roam from client to client via Exchange.  This setting does not affect RSS Feeds that were subscribed before the policy setting was enabled.  This setting also does not prevent the user from manually directing an RSS Feed to deliver to the user's mailbox, which allows the RSS Feed to roam from client to client.","supportedPlatforms":["Windows"],"tags":["RSS Feeds","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\rss","registrySubPath":"disableroaming","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableRoamingofSharePointlists","uniqueId":3646,"displayName":"Do not roam users' SharePoint lists","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, links to SharePoint lists are available on each client that the users use to connect to their Microsoft Exchange Server mailboxes.  This setting allows you to disable roaming links to SharePoint lists.  When roaming is disabled, SharePoint lists are available only on the client that originally linked them.","supportedPlatforms":["Windows"],"tags":["SharePoint Lists","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\wss","registrySubPath":"disableroaming","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableRoamingSettings","uniqueId":3843,"displayName":"Disable roaming settings in Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether roaming settings will be used to store accounts and their settings.\n\nIf you enable this policy setting, roaming settings will not store Outlook accounts or their settings in the cloud.","supportedPlatforms":["Windows"],"tags":["Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\setup","registrySubPath":"disableroamingsettings","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableRpcTransportFallback","uniqueId":3604,"displayName":"Disable connection fallback between protocols","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control the connection transport fallback behavior in Outlook when it attempts to connect to a Microsoft Exchange Server.\n \nThis policy setting applies if you are using Outlook Anywhere (RPC over HTTP) to connect to a Microsoft Exchange Server. There are two Outlook profile settings on the Microsoft Exchange Proxy Settings dialog box (accessed through the Control Panel or Account Settings), that configure the default connection transport fallback behavior.\n \n- On fast networks, connect using HTTP first, then connect using TCP/IP\n- On slow networks, connect using HTTP first, then connect using TCP/IP\n \nFor example, if you are on a fast network and you enable the “On fast networks, connect using HTTP first, then connect using TCP/IP” setting in the Microsoft Exchange Proxy Settings dialog box, Outlook first attempts to connect to the Exchange Server using HTTP. If Outlook is unable to connect using HTTP, then it attempts to connect using TCP/IP.\n \nIf you enable this policy setting, if Outlook connection attempts with Microsoft Exchange Server fail, Outlook does not fallback to the TCP/IP protocol, regardless of what is specified in the Microsoft Exchange Proxy Settings dialog box. \n\nIf you disable or do not configure this policy setting, Outlook connection attempts with Microsoft Exchange Server can fallback from either TCP/IP to HTTP, or HTTP to TCP/IP, depending on the settings specified in the Microsoft Exchange Proxy Settings dialog box.\n","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\rpc","registrySubPath":"disablerpctcpfallback","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableSharepointintegrationinOutlook","uniqueId":3644,"displayName":"Do not allow Sharepoint-Outlook integration","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to prevent access to Microsoft SharePoint Foundation with Outlook.\n\nIf you enable this policy setting, user profiles will not be able to upload new items or sync changes to the SharePoint list from the server; however, user profiles that have pre-existing SharePoint lists will retain their local data.  In addition, new SharePoint lists cannot be connected when this policy setting is enabled.  This can be toggled on and off to restore synchronization to existing lists.  Note that users will not receive a message if synchronization has been prevented.\n\nIf you disable or do not configure this policy setting, Microsoft SharePoint Foundation access will be allowed with Outlook.","supportedPlatforms":["Windows"],"tags":["SharePoint Lists","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\wss","registrySubPath":"disable","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_disableshortcutkeys39","uniqueId":3654,"displayName":"Disable shortcut keys","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_disableshortcutkeys39;L_Enterakeyandmodifiertodisable","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specify the virtual key code and modifier for the shortcut key to disable.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_disableshortcutkeys39;L_Enterakeyandmodifiertodisable","uniqueId":3653,"displayName":"Enter a key and modifier to disable","settingType":{"possibleValues":{"possibleValuesType":"List","ValueType":"string"},"dataType":"Collection"},"description":"Specify the virtual key code and modifier for the shortcut key to disable.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\disabledshortcutkeyslist","registryPath":"KeyMod","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_DisableSignatures","uniqueId":3385,"displayName":"Do not allow signatures for e-mail messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to prevent Outlook users from adding signatures to e-mails they create, reply to, or forward. \n\nIf you enable this policy setting, Outlook users cannot manually add signatures to e-mails they create, reply to, or forward, nor will they be able to configure automatic signatures.\n\nIf you disable or do not configure this policy setting, Outlook 2016 users can add signatures to e-mail messages either manually or automatically.","supportedPlatforms":["Windows"],"tags":["Mail Format","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\mailsettings","registrySubPath":"disablesignatures","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableSimpleMapiSendWithoutOutlook","uniqueId":3778,"displayName":"Running Outlook for Simple MAPI Mail Sending","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether users can send mail through Simple MAPI when Outlook is not active.\n\nIf you enable this policy setting, users are required to have Outlook running to send mail through Simple MAPI. This will force users to open Outlook to send mail, ensuring that Outlook Add-ins run properly before the mail is sent. \n\nIf you disable this policy setting, users are allowed to send mail through Simple MAPI regardless of Outlook running.\n\nWhen this policy setting is not configured, it functions as if it has been disabled, allowing users to send mail through Simple MAPI without having Outlook running.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"disablesimplemapisendwithoutoutlook","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableSupportBackstage","uniqueId":3840,"displayName":"Disable the Support tab under the File menu in Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether the Support tab will be displayed under the File menu in Outlook.\n\nIf you enable this policy setting, then the Support tab will not be displayed under the File menu in Outlook.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"disablesupportbackstage","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableSupportDiagnostics","uniqueId":3839,"displayName":"Disable support diagnostics in Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines if Outlook can communicate client information on failure to support services with the intent of diagnosing the issue or making the information available to support to help with the diagnosis/resolution of the issue and/or provide contextual error messaging to the user.\n\nIf you enable this policy setting, then Outlook will not communicate client information on failure to support services.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"disablesupportdiagnostics","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableSupportTicketCreationInOutlook","uniqueId":3838,"displayName":"Disable support ticket creation in Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines if an Outlook support ticket can be created in Outlook.\n\nIf you enable this policy setting, users will be unable to create a support ticket in Outlook.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"disablesupportticketcreationinoutlook","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Disableuserentriestoserverlist;L_Checktodisableusersfromaddingentriestoserverlist","uniqueId":3709,"displayName":"Check to disable users from adding entries to server list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Publish default, allow others","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Publish default, disallow others","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This policy setting controls whether Outlook users can add entries to the list of SharePoint servers when establishing a meeting workspace. \n\nIf you enable this policy setting, you can choose between two options to determine whether Outlook users can add entries to the published server list: \n\n- Publish default, allow others. This option is the default configuration in Outlook. \n\n- Publish default, disallow others. This option prevents users from adding servers to the default published server list. \n\nIf you disable or do not configure this policy setting, when users create a meeting workspace, they can choose a server from a default list provided by administrators or manually enter the address of a server that is not listed. This is the equivalent of Enabled -- Publish default, allow others.","supportedPlatforms":["Windows"],"tags":["Meeting Workspace","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\meetings\\profile","registrySubPath":"serverui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Disableuserentriestoserverlist","uniqueId":3710,"displayName":"Disable user entries to server list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Disableuserentriestoserverlist;L_Checktodisableusersfromaddingentriestoserverlist","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls whether Outlook users can add entries to the list of SharePoint servers when establishing a meeting workspace. \n\nIf you enable this policy setting, you can choose between two options to determine whether Outlook users can add entries to the published server list: \n\n- Publish default, allow others. This option is the default configuration in Outlook. \n\n- Publish default, disallow others. This option prevents users from adding servers to the default published server list. \n\nIf you disable or do not configure this policy setting, when users create a meeting workspace, they can choose a server from a default list provided by administrators or manually enter the address of a server that is not listed. This is the equivalent of Enabled -- Publish default, allow others.","supportedPlatforms":["Windows"],"tags":["Meeting Workspace","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_DisableVLVBrowsingonLDAPservers","uniqueId":3767,"displayName":"Disable VLV Browsing on LDAP servers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"When this policy is enabled, Outlook will not use the Virtual List Views (VLV) LDAP extension when querying an LDAP servier.  When the policy is not configured or disabled, Outlook will use the Virtual Lst Views (VLV) LDAP extension when querying an LDAP server.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\ldap","registrySubPath":"disablevlvbrowsing","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableWeather","uniqueId":3345,"displayName":"Disable Weather Bar","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn on or turn off the Weather Bar.\n\nIf you enable this policy setting, the Weather Bar is turned off.\n\nIf you disable or do not configure this setting, the Weather Bar is turned on.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"disableweather","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableWebCalIntegration","uniqueId":3635,"displayName":"Do not include Internet Calendar integration in Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to determine whether or not you want to include Internet Calendar integration in Outlook. The Internet Calendar feature in Outlook enables users to publish calendars online (using the webcal:// protocol) and subscribe to calendars that others have published. When users subscribe to an Internet calendar, Outlook queries the calendar at regular intervals and downloads any changes as they are posted. \n\nIf you enable this policy setting, all Internet calendar functionality in Outlook is disabled. \n\nIf you disable or do not configure this policy setting, Outlook allows users to subscribe to Internet calendars.","supportedPlatforms":["Windows"],"tags":["Internet Calendars","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\webcal","registrySubPath":"disable","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisableWindowsFriendlyLogonMailQuery","uniqueId":3776,"displayName":"Do not show unread message count on Windows Welcome screen","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, Windows queries Outlook for the unread message count for users and displays the result on the Windows Welcome screen. By enabling this setting, you can change this behavior so that Windows does not provide this feature on the Welcome screen.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook","registrySubPath":"dontupdatefriendlylogon","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisallowDownloadFullItemsFileCachedExchangeMode","uniqueId":3564,"displayName":"Disallow Download Full Items","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off the \"Download Full Items\" option.\n\nIf you enable this policy setting, you will turn off the \"Download Full Items\" option in the Download Preferences menu in the Send/Receive tab.\n\nIf you disable or do not configure this policy setting, you will allow the \"Download Full Items\" option in the Download Preferences menu in the Send/Receive tab.","supportedPlatforms":["Windows"],"tags":["Cached Exchange Mode","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\cached mode","registrySubPath":"nofullitems","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisallowDownloadHeadersFileCachedExchangeMode","uniqueId":3566,"displayName":"Disallow Download Headers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Disables/Enables the option \"Download Headers\" in the Server group of the Send/Receive tab.","supportedPlatforms":["Windows"],"tags":["Cached Exchange Mode","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\cached mode","registrySubPath":"noheaders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisallowDownloadHeadersthenFullItemsFileCachedExchangeMode","uniqueId":3565,"displayName":"Disallow Download Headers then Full Items","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off the \"Download Headers and then Full Items\" option.  Microsoft Exchange Server 2003 or later is required.\n\nIf you enable this policy setting, you will turn off the \"Download Headers and then Full Items\" option in the Download Preferences menu in the Send/Receive tab.\n\nIf you disable or do not configure this policy setting, you will allow the \"Download Headers and then Full Items\" option in the Download Preferences menu in the Send/Receive tab.","supportedPlatforms":["Windows"],"tags":["Cached Exchange Mode","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\cached mode","registrySubPath":"nodrizzle","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisallowOnSlowConnectionsOnlyDownloadHeadersFileCachedExchan","uniqueId":3567,"displayName":"Disallow On Slow Connections Only Download Headers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off the \"On Slow Connections Download Only Headers\" option.\n\nIf you enable this policy setting, you will turn off the \"On Slow Connections Download Only Headers\" option in the Download Preferences menu in the Send/Receive tab.\n\nIf you disable or do not configure this policy setting, you will allow the \"On Slow Connections Download Only Headers\" option in the Download Preferences menu in the Send/Receive tab.","supportedPlatforms":["Windows"],"tags":["Cached Exchange Mode","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\cached mode","registrySubPath":"noslowheaders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisplayDeveloperTab","uniqueId":3199,"displayName":"Display Developer tab in the Ribbon","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the Developer tab will be displayed in the Ribbon.\n\nIf you enable this policy setting, the Developer tab will be displayed in the Ribbon.\n\nIf you disable this policy setting, the Developer tab will not be displayed in the Ribbon.\n\nIf you do not configure this policy setting, the Developer tab will not be displayed in the Ribbon, but its visibility can be changed via a setting in the application Options dialog box.","supportedPlatforms":["Windows"],"tags":["Customize Ribbon","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options","registrySubPath":"developertools","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DisplaySenderPicture","uniqueId":3226,"displayName":"Display Sender Picture","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook displays pictures in email headers for senders of email messages and meeting requests. \n\t  \nIf you enable or do not configure this policy setting Outlook displays pictures for senders if they are available. \n\nIf you disable this policy setting, pictures of senders will not be displayed.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"showcontactpicture","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DLPPolicyTips","uniqueId":5394,"displayName":"Enable Purview Data Loss Prevention (DLP) policy tips in Outlook for Mac","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Purview Data Loss Prevention (DLP) policy tips for Microsoft Outlook for Mac provide real-time notifications to users when an email message contains sensitive information that violates organizational policies. Policy tips are displayed directly in the mail tip UI and allow users to remove non-compliant content or recipients, or to override the policy when permitted.\n\nIf you enable this policy setting, DLP policy tips are displayed when applicable DLP conditions are met.\n\nIf you disable or don't configure this policy setting, DLP policy tips are not displayed.\n\nNote: This policy setting applies only to Outlook for Mac version 16.108. and later.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["DLPPolicyTips","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"DLPPolicyTips","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DoNewOutlookAutoMigration","uniqueId":3863,"displayName":"Admin-Controlled Migration to New Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy controls the ability of IT admins to initiate the migration of users from classic Outlook to new Outlook.\n\nIf you enable this policy setting, IT admins will start the process to switch users from classic Outlook to new Outlook.\n\nIf you disable this policy setting, the migration process to new Outlook will be stopped, keeping users on their current version of Outlook without transitioning to new Outlook.\n\nIf you do not set this policy setting, the migration process to new Outlook will not start, and users that have not migrated will remain on classic Outlook.\n\nNote: IT admins can also define intervals for re-initiating the migration process for users who revert to classic Outlook from new Outlook. This is managed through the NewOutlookAutoMigrationRetryIntervals policy, offering a tailored strategy for transitioning users based on organizational requirements and user feedback.\n      ","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"donewoutlookautomigration","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DoNotAllowHorizontalCalendarView","uniqueId":3305,"displayName":"Do not allow horizontal calendar view","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to prevent horizontal calendar view.\n\nIf you enable this policy setting, horizontal calendar view is not allowed.\n\nIf you disable or do not configure this policy setting, horizontal calendar view is allowed.","supportedPlatforms":["Windows"],"tags":["Schedule View","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"disablehorizontalcalendar","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DoNotAllowOnDemandActivitySynchronization","uniqueId":3790,"displayName":"Do not allow on-demand activity synchronization","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to prevent on-demand synchronization of activity information between Outlook and social networks.\n\nIf you enable this policy setting, on-demand synchronization is blocked.  \n\nIf you disable or you do not configure this policy setting, on-demand synchronization is allowed.","supportedPlatforms":["Windows"],"tags":["Outlook Social Connector","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\outlook\\socialconnector","registrySubPath":"ondemandactivitysync","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Donotautomaticallysignreplies","uniqueId":3501,"displayName":"Do not automatically sign replies","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to specify whether replies will be automatically signed.\n\nIf you enable this policy setting, the option to respond automatically to a signed message with a signed response will be overridden, and an unsigned response will be the default reply to a signed message.\n\nIf you disable or do not configure this policy setting, a signed response will be the default reply to a signed message.","supportedPlatforms":["Windows"],"tags":["Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"nosignonreply","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Donotcheckemailaddressagainstaddressofcertificatesbeingusing","uniqueId":3517,"displayName":"Do not check e-mail address against address of certificates being used","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook verifies the user's e-mail address with the address associated with the certificate used for signing.\n\nIf you enable this policy setting, users can send messages signed with certificates that do not match their e-mail addresses.\n\nIf you disable or do not configure this policy setting, Outlook verifies that the user's e-mail address matches the certificate being used for signing.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"supressnamechecks","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DoNotCreateNewOstOnUpgrade","uniqueId":3607,"displayName":"Do not create new OST file on upgrade","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook creates a new OST file when you upgrade to Outlook 2016. The new OST file uses less space on the disk. When a new OST file is created, the contents from the previous version of Outlook are downloaded from the Exchange Server.\n\nIf you enable this policy setting, Outlook continues to use the existing OST file created by the installed earlier version of Outlook. \n\nIf you disable or do not configure this policy setting, when you upgrade to Outlook 2016, a new OST file is created, and the contents from the installed earlier version of Outlook are downloaded from the Exchange server.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\ost","registrySubPath":"donotcreatenewostonupgrade","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DonotdownloadpermissionlicenseforIRMemailduring","uniqueId":3768,"displayName":"Do not download rights permission license information for IRM e-mail during Exchange folder sync","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, IRM license information for e-mail messages is downloaded to the user's local cache when Outlook synchronizes with Exchange. By enabling this setting, you can change this behavior so that licence information is not cached locally and users must connect to the network to retreive license information in order to open rights-managed e-mail messages.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\drm","registrySubPath":"donotacquiredrmlicenseonsync","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DoNotDownloadPhotosFromActiveDirectory","uniqueId":3789,"displayName":"Do not download contact photos from Active Directory","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether contact photos are downloaded from the Active Directory.\n\nIf you enable this policy setting, contact photos are not downloaded.  \n\nIf you disable or you do not configure this policy setting, contact photos are downloaded.","supportedPlatforms":["Windows"],"tags":["Outlook Social Connector","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\outlook\\socialconnector","registrySubPath":"downloaddetailsfromad","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DoNotDownloadPhotosFromTheActiveDirectory","uniqueId":3410,"displayName":"Do not download user photos from Active Directory","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether user photos will be downloaded from Active Directory (if available).  \n\nIf you enable this policy setting, user photos will not be downloaded.\n\nIf you disable or do not configure this policy setting, user photos will be downloaded.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\contact","registrySubPath":"downloadphotosfromad","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DoNotIncludeTheOnlineArchiveInAllMailItemSearch","uniqueId":3207,"displayName":"Do not include the Online Archive in All Mail Item search","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy sets the default action in All Mail Item search to not include search results from the Online Archive.\n\nIf you enable this policy setting, search results from the Online Archive will not be included in an All Mail Item search in Outlook.\n\nIf you disable or do not configure this policy setting, search results from the Online Archive will be included in an All Mail Item search in Outlook.","supportedPlatforms":["Windows"],"tags":["Search Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\search","registrySubPath":"disableonlinearchiveinupscopedsearchbydefault","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DoNotSendMeetingForwardNotifications","uniqueId":3745,"displayName":"Do not send meeting forward notifications","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting prevents Outlook from sending meeting forward notifications.  This does not affect whether or not Exchange sends meeting forward notifications.  \n\nIf you enable this policy setting, Outlook will not send meeting forward notifications.\n\nIf you disable or do not configure this policy setting, Outlook will send meeting forward notifications.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"disableolksendingmtgfwdnotifs","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DoNotShowSocialNetworkInfoBars","uniqueId":3780,"displayName":"Do not show social network info-bars","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether certain info-bar messages that will prompt users to install social network providers are displayed in the social connector.  \n\nIf you enable this policy setting, the info-bars are not shown.\n\nIf you disable or you do not configure this policy setting, the info-bars are shown.","supportedPlatforms":["Windows"],"tags":["Outlook Social Connector","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\outlook\\socialconnector","registrySubPath":"unmanagedinfobars","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DoNotUseConversationalArrangementInViews","uniqueId":3228,"displayName":"Do not use Conversation arrangement in Views","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to prevent the use of Conversation arrangement in Views.\n\nIf you enable this policy setting, you will prevent Conversational arrangement in Views.\n\nIf you disable or do not configure this policy setting, users will be able to use Conversation arrangement in Views.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\setup","registrySubPath":"upgradetoconversations","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Downloadfulltextofarticles","uniqueId":3626,"displayName":"Download full text of articles as HTML attachments","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook automatically makes an offline copy of the RSS items as HTML attachments.\n\nIf you enable this policy setting, Outlook automatically makes an offline copy of RSS items as HTML attachments. \n\nIf you disable or do not configure this policy setting, Outlook will not automatically make an offline copy of RSS items as HTML attachments.","supportedPlatforms":["Windows"],"tags":["RSS Feeds","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\rss","registrySubPath":"enablefulltexthtml","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DownloadPublicFolderFavorites","uniqueId":3568,"displayName":"Download Public Folder Favorites","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checked: Checks the \"Download Public Folder Favorites\" option in the Advanced tab of the Microsoft Exchange Server dialog box (More Settings button in the E-mail Accounts dialog box) and enables the option. This enables Public Folder Favorites synchronization in Cached Exchange mode. | Unchecked: Unchecks the \"Download Public Folder Favorites\" option in the Advanced tab of the Microsoft Exchange Server dialog box (More Settings button in the E-mail Accounts dialog box) and disables the option. This disables Public Folder Favorites synchronization in Cached Exchange mode.","supportedPlatforms":["Windows"],"tags":["Cached Exchange Mode","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\cached mode","registrySubPath":"syncpffav","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Downloadshardnonmailfolders","uniqueId":3569,"displayName":"Download shared non-mail folders","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, most shared folders that users access in other mailboxes are automatically downloaded and cached in the users' local OST files when Cached Exchange Mode is enabled. Only shared Mail folders are not cached. You can use this setting to change this behavior so that non-mail folders are not downloaded automatically.","supportedPlatforms":["Windows"],"tags":["Cached Exchange Mode","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\cached mode","registrySubPath":"downloadsharedfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_DraftsFolderHomePage","uniqueId":3682,"displayName":"Drafts Folder Home Page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_DraftsFolderHomePage;L_showassociatedwebpage51","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_DraftsFolderHomePage;L_urladdressofassociatedwebpage52","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_DraftsFolderHomePage;L_turnoffinternetexplorersecuritychecksforthiswebpage53","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Drafts Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_DraftsFolderHomePage;L_showassociatedwebpage51","uniqueId":3679,"displayName":"Show associated web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Drafts Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\drafts","registrySubPath":"show","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_DraftsFolderHomePage;L_turnoffinternetexplorersecuritychecksforthiswebpage53","uniqueId":3681,"displayName":"Turn off Windows Internet Explorer security checks for this web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Drafts Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\drafts","registrySubPath":"security","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_DraftsFolderHomePage;L_urladdressofassociatedwebpage52","uniqueId":3680,"displayName":"URL address of associated web page:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Drafts Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\drafts","registrySubPath":"url","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_EASSyncFrequency","uniqueId":3631,"displayName":"EAS Sync Frequency","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_EASSyncFrequency;L_EASSyncFrequencyIntervalSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the number of minutes that Outlook automatically syncs the users' Exchange ActiveSync (EAS) accounts.\n\nIf you enable this policy setting, you can specify the number of minutes.\n\nIf you disable or do not configure this policy setting, Outlook automatically syncs the users’ EAS accounts every 59 minutes.","supportedPlatforms":["Windows"],"tags":["Exchange ActiveSync","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_EASSyncFrequency;L_EASSyncFrequencyIntervalSpinID","uniqueId":3630,"displayName":"Synchronization interval (in minutes):","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":5,"maximum":59},"dataType":"Integer"},"defaultValue":"59","description":"This policy setting allows you to specify the number of minutes that Outlook automatically syncs the users' Exchange ActiveSync (EAS) accounts.\n\nIf you enable this policy setting, you can specify the number of minutes.\n\nIf you disable or do not configure this policy setting, Outlook automatically syncs the users’ EAS accounts every 59 minutes.","supportedPlatforms":["Windows"],"tags":["Exchange ActiveSync","Account Settings","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\eas","registrySubPath":"pushduration","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_EmptyDeletedItemsFolder","uniqueId":3415,"displayName":"Empty the Deleted Items folder when Outlook closes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, the Deleted Items folder is not emptied when users exit Outlook. By enabling this setting, you can change this behavior so that the Deleted Items folder is emptied when Outlook closes.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"emptytrash","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_EnableAIACertEvaluation","uniqueId":3534,"displayName":"Enable Retrieval of Remote Certificate Authority Information","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook will use remote certificate authority information in a secure email message to validate that its certificate is trusted. \n\nIf you enable this setting, you’ll allow the operating system to access remote network locations specified in a certificate for validation.\n\nIf you disable or don’t configure this setting, retrieval of remote Certificate Authority Information won’t be allowed, and only stored certificates will be used for authentication.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"enableaiacertextension","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_EnableCryptographyIcons","uniqueId":3533,"displayName":"Enable Cryptography Icons","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Sets the value for the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"convertsmimeblobsignedicons","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_EnableEASAccountCreation","uniqueId":3842,"displayName":"Enable Exchange ActiveSync account creation in the Outlook account setup UI","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether the Exchange ActiveSync button will be displayed in the account setup UI.\n\nIf you enable this policy setting, the Exchange ActiveSync button will be displayed in Outlook account setup UI.","supportedPlatforms":["Windows"],"tags":["Exchange ActiveSync","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\setup","registrySubPath":"enableeasaccountcreation","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_EnableEndEarly","uniqueId":3823,"displayName":"End appointments and meetings early","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\n        This policy setting allows you to control whether the end time of appointments and meetings are reduced by a specified number of minutes when a user creates an appointment or meeting.\n\n        If you enable this policy setting, the end time of appointments and meetings are reduced by a specified number of minutes when a user creates an appointment or meeting.\n\n        To specify how many minutes to reduce appointments and meetings by, you can use the “Reduce the end time of short appointments and meetings by a specified number of minutes” and “Reduce the end time of long appointments and meetings by a specified number of minutes” policy settings.\n\n        If you don’t enable those policy settings to specify a time in minutes, users will be able to specify a time, in minutes, by going to File > Options > Calendar. If the user hasn’t specified a time, default values of 5 minutes, for short meetings, and 10 minutes, for long meetings, will be used.\n\n        If you disable this policy setting, appointments and meetings can’t be configured to end early and the option will be disabled under File > Options > Calendar and can’t be enabled by the user.\n\n        If you don’t configure this policy setting, appointments and meetings aren’t configured to end early, but the user can enable appointments and meetings to end early by going to File > Options > Calendar.\n\n        Note: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n      ","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"endeventsearly","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_EnableExchangeOverInternetUserInterface;L_ChooseUIStatewhenOScansupportfeature","uniqueId":3601,"displayName":"Choose UI State when OS can support feature:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hidden","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"All config UI enabled","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable only On/Off control but not config UI","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable config UI when settings are pre-deployed","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable but show all config UI","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can view and change user interface (UI) options for Outlook Anywhere.\n\nIf you enable this policy setting, users can view and change UI options for Outlook Anywhere.\n\nIf you disable or do not configure this policy setting, users will be able to use the Outlook Anywhere feature, but they will not be able to view or change UI options for it.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\rpc","registrySubPath":"enablerpctunnelingui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_EnableExchangeOverInternetUserInterface","uniqueId":3602,"displayName":"Configure Outlook Anywhere user interface options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_EnableExchangeOverInternetUserInterface;L_ChooseUIStatewhenOScansupportfeature","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can view and change user interface (UI) options for Outlook Anywhere.\n\nIf you enable this policy setting, users can view and change UI options for Outlook Anywhere.\n\nIf you disable or do not configure this policy setting, users will be able to use the Outlook Anywhere feature, but they will not be able to view or change UI options for it.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Enablelinksinemailmessages","uniqueId":3552,"displayName":"Allow hyperlinks in suspected phishing e-mail messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting controls whether hyperlinks in suspected phishing e-mail messages in Outlook are allowed. \n\nIf you enable this policy setting, Outlook will allow hyperlinks in suspected phishing messages that are not also classified as junk e-mail. \n\nIf you disable or do not configure this policy setting, Outlook will not allow hyperlinks in suspected phishing messages, even if they are not classified as junk e-mail.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"junkmailenablelinks","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Enablemailloggingtroubleshooting","uniqueId":3431,"displayName":"Enable mail logging (troubleshooting)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"enablelogging","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_EnableMeetingDownLevelText","uniqueId":3318,"displayName":"Enable down-level meeting text","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook automatically displays the meeting time and location in the meeting request body.\n\nIf you enable this policy setting, Outlook automatically displays the meeting time and location in the meeting request body.\n\nIf you disable or do not configure this policy setting, Outlook does not automatically display the meeting time and location in the meeting request body.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"enablemeetingdownleveltext","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_EnableRPCEncryption","uniqueId":3603,"displayName":"Enable RPC encryption","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting controls whether Outlook uses remote procedure call (RPC) encryption to communicate with Microsoft Exchange servers. \n\nIf you enable this policy setting, Outlook uses RPC encryption when communicating with an Exchange server. Note - RPC encryption only encrypts the data from the Outlook client computer to the Exchange server. It does not encrypt the messages themselves as they traverse the Internet. \n\nIf you disable or do not configure this policy setting, RPC encryption is still used by default.  This setting allows you to override the corresponding per-profile setting.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\rpc","registrySubPath":"enablerpcencryption","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_EnableScriptsInOneOffForms","uniqueId":3470,"displayName":"Allow scripts in one-off Outlook forms","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting controls whether scripts can run in Outlook forms in which the script and layout are contained within the message. \n\nIf you enable this policy setting, scripts can run in one-off Outlook forms. \n\nIf you disable or do not configure this policy setting, Outlook does not run scripts in forms in which the script and the layout are contained within the message. \n\nImportant: This policy setting only applies if the \"Outlook Security Mode\" policy setting under \"Microsoft Outlook 2016\\Security\\Security Form Settings\" is configured to \"Use Outlook Security Group Policy.\"","supportedPlatforms":["Windows"],"tags":["Custom Form Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"enableoneoffformscripts","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Encodingforoutgoingmessages","uniqueId":3404,"displayName":"Encoding for outgoing messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Encodingforoutgoingmessages;L_Usethisencodingforoutgoingmessages","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value in the option \"Preferred encoding for outgoing messages\".","supportedPlatforms":["Windows"],"tags":["International Options","Mail Format","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Encodingforoutgoingmessages;L_Usethisencodingforoutgoingmessages","uniqueId":3403,"displayName":"Use this encoding for outgoing messages:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":28596,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic (ISO)","description":"","tags":[],"dependencyGroup":null},{"value":1256,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic (Windows)","description":"","tags":[],"dependencyGroup":null},{"value":28594,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Baltic (ISO)","description":"","tags":[],"dependencyGroup":null},{"value":1257,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Baltic (Windows)","description":"","tags":[],"dependencyGroup":null},{"value":28592,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Central European (ISO)","description":"","tags":[],"dependencyGroup":null},{"value":1250,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Central European (Windows)","description":"","tags":[],"dependencyGroup":null},{"value":54936,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Chinese Simplified (GB18030)","description":"","tags":[],"dependencyGroup":null},{"value":936,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Chinese Simplified (GB2312)","description":"","tags":[],"dependencyGroup":null},{"value":52936,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Chinese Simplified (HZ)","description":"","tags":[],"dependencyGroup":null},{"value":950,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Chinese Traditional (Big5)","description":"","tags":[],"dependencyGroup":null},{"value":28595,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cyrillic (ISO)","description":"","tags":[],"dependencyGroup":null},{"value":20866,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cyrillic (KOI8-R)","description":"","tags":[],"dependencyGroup":null},{"value":21866,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cyrillic (KOI8-U)","description":"","tags":[],"dependencyGroup":null},{"value":1251,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cyrillic (Windows)","description":"","tags":[],"dependencyGroup":null},{"value":28597,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Greek (ISO)","description":"","tags":[],"dependencyGroup":null},{"value":1253,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Greek (Windows)","description":"","tags":[],"dependencyGroup":null},{"value":38598,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hebrew (ISO-Logical)","description":"","tags":[],"dependencyGroup":null},{"value":1255,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hebrew (Windows)","description":"","tags":[],"dependencyGroup":null},{"value":51932,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Japanese (EUC)","description":"","tags":[],"dependencyGroup":null},{"value":50220,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Japanese (JIS)","description":"","tags":[],"dependencyGroup":null},{"value":50221,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Japanese (JIS-Allow 1 byte Kana)","description":"","tags":[],"dependencyGroup":null},{"value":932,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Japanese (Shift-JIS)","description":"","tags":[],"dependencyGroup":null},{"value":949,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Korean","description":"","tags":[],"dependencyGroup":null},{"value":51949,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Korean (EUC)","description":"","tags":[],"dependencyGroup":null},{"value":28593,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Latin 3 (ISO)","description":"","tags":[],"dependencyGroup":null},{"value":28605,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Latin 9(ISO)","description":"","tags":[],"dependencyGroup":null},{"value":874,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Thai (Windows)","description":"","tags":[],"dependencyGroup":null},{"value":28599,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Turkish (ISO)","description":"","tags":[],"dependencyGroup":null},{"value":1254,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Turkish (Windows)","description":"","tags":[],"dependencyGroup":null},{"value":65000,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Unicode (UTF-7)","description":"","tags":[],"dependencyGroup":null},{"value":65001,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Unicode (UTF-8)","description":"","tags":[],"dependencyGroup":null},{"value":20127,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"US-ASCII","description":"","tags":[],"dependencyGroup":null},{"value":50000,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"User Defined","description":"","tags":[],"dependencyGroup":null},{"value":1258,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Vietnamese (Windows)","description":"","tags":[],"dependencyGroup":null},{"value":28591,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Western European (ISO)","description":"","tags":[],"dependencyGroup":null},{"value":1252,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Western European (Windows)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":28596,"description":"Sets the value in the option \"Preferred encoding for outgoing messages\".","supportedPlatforms":["Windows"],"tags":["International Options","Mail Format","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mshtml\\international","registrySubPath":"default_codepageout","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Encryptallemailmessages","uniqueId":3518,"displayName":"Encrypt all e-mail messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to require that all e-mail messages be encrypted when sent from Outlook.\n\nIf you enable this policy setting, the Encrypt button is automatically selected on all outgoing e-mail messages, meeting invitations, and other Outlook items. Users must select an appropriate certificate to encrypt the message for the intended recipient.\n\nIf you disable or do not configure this policy setting, outgoing e-mail messages are not encrypted. If you disable this policy setting, users will not be able to change the configuration.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"alwaysencrypt","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_EndEarlyLong","uniqueId":3829,"displayName":"Reduce the end time of long appointments and meetings by a specified number of minutes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_EndEarlyLong;L_EndEarlyLongSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\n        This policy setting allows you to specify how many minutes to reduce the end time of a long appointment or meeting by when a user creates an appointment or meeting. A long appointment or meeting is one that lasts for one hour or longer.\n\n        If you enable this policy setting, you specify the number of minutes to reduce the end time of a long appointment or meeting by when a user creates an appointment or meeting. The user won’t be able to change this value by going to File > Options > Calendar.\n\n        Note: You should also enable the “End appointments and meetings early” policy setting\n\n        If you disable or don’t configure this policy setting, the default value of 10 minutes is used or whatever the user specifies by going to File > Options > Calendar.\n\n        Note: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n      ","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_EndEarlyLong;L_EndEarlyLongSpinID","uniqueId":3828,"displayName":"Minutes to reduce meetings by:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":29},"dataType":"Integer"},"defaultValue":"10","description":"\n        This policy setting allows you to specify how many minutes to reduce the end time of a long appointment or meeting by when a user creates an appointment or meeting. A long appointment or meeting is one that lasts for one hour or longer.\n\n        If you enable this policy setting, you specify the number of minutes to reduce the end time of a long appointment or meeting by when a user creates an appointment or meeting. The user won’t be able to change this value by going to File > Options > Calendar.\n\n        Note: You should also enable the “End appointments and meetings early” policy setting\n\n        If you disable or don’t configure this policy setting, the default value of 10 minutes is used or whatever the user specifies by going to File > Options > Calendar.\n\n        Note: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n      ","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"endearlylong","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_EndEarlyShort","uniqueId":3827,"displayName":"Reduce the end time of short appointments and meetings by a specified number of minutes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_EndEarlyShort;L_EndEarlyShortSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\n        This policy setting allows you to specify how many minutes to reduce the end time of a short appointment or meeting by when a user creates an appointment or meeting. A short appointment or meeting is one that lasts for less than one hour.\n\n        If you enable this policy setting, you specify the number of minutes to reduce the end time of a short appointment or meeting by when a user creates an appointment or meeting. The user can’t change this value by going to File > Options > Calendar.\n\n        Note: You should also enable the “End appointments and meetings early” policy setting.\n\n        If you disable or don’t configure this policy setting, the default value of 5 minutes is used or whatever the user specifies by going to File > Options > Calendar.\n\n        Note: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n      ","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_EndEarlyShort;L_EndEarlyShortSpinID","uniqueId":3826,"displayName":"Minutes to reduce meetings by:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":29},"dataType":"Integer"},"defaultValue":"5","description":"\n        This policy setting allows you to specify how many minutes to reduce the end time of a short appointment or meeting by when a user creates an appointment or meeting. A short appointment or meeting is one that lasts for less than one hour.\n\n        If you enable this policy setting, you specify the number of minutes to reduce the end time of a short appointment or meeting by when a user creates an appointment or meeting. The user can’t change this value by going to File > Options > Calendar.\n\n        Note: You should also enable the “End appointments and meetings early” policy setting.\n\n        If you disable or don’t configure this policy setting, the default value of 5 minutes is used or whatever the user specifies by going to File > Options > Calendar.\n\n        Note: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n      ","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"endearlyshort","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Englishmessageheadersandflags","uniqueId":3398,"displayName":"English message headers and flags","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Englishmessageheadersandflags;L_UseEnglishformessageheadersonrepliesorforwards","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Englishmessageheadersandflags;L_UseEnglishformessageflags","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["International Options","Mail Format","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Englishmessageheadersandflags;L_UseEnglishformessageflags","uniqueId":3397,"displayName":"Use English for message flags","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["International Options","Mail Format","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"enmessageflags","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Englishmessageheadersandflags;L_UseEnglishformessageheadersonrepliesorforwards","uniqueId":3396,"displayName":"Use English for message headers on replies or forwards","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["International Options","Mail Format","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"enmessageheaders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_EnsureallSMIMEsignedmessageshavealabel","uniqueId":3524,"displayName":"Ensure all S/MIME signed messages have a label","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook requires labels on S/MIME signed messages.\n\nIf you enable this policy setting, labels must be attached to all Outlook S/MIME messages before they are sent. Users can attach labels to messages in the \"Message Options\" dialog box by clicking \"Security Settings,\" ensuring that the \"Add digital signature to this message\" check box is selected, and selecting a label under \"Security Label.\"\n\nIf you disable all S/MIME signed messages are not required to have a label, and users cannot change this functionality.\n\nIf you do not configure this policy setting, all S/MIME signed messages are not required to have a label, but users can change this functionality through the \"Message Options\" dialog box.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"forcesecuritylabel","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Entermaximumsecondstowaittosyncchanges","uniqueId":3561,"displayName":"Enter maximum seconds to wait to sync changes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Entermaximumsecondstowaittosyncchanges;L_EntersecondstowaitbeforesyncDefault60sec","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies maximum number of seconds to wait before synchronizing changes with the Exchange server.","supportedPlatforms":["Windows"],"tags":["Cached Exchange Mode","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Entermaximumsecondstowaittosyncchanges;L_EntersecondstowaitbeforesyncDefault60sec","uniqueId":3560,"displayName":"Enter seconds to wait before sync(Default 60 sec.)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":86400},"dataType":"Integer"},"description":"Specifies maximum number of seconds to wait before synchronizing changes with the Exchange server.","supportedPlatforms":["Windows"],"tags":["Cached Exchange Mode","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\cached mode","registrySubPath":"maximum","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Entersecondstowaittodownloadchangesfromserver;L_EntersecondstowaitbeforedownloadDefault30sec","uniqueId":3558,"displayName":"Enter seconds to wait before download(Default 30 sec.)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":86400},"dataType":"Integer"},"description":"Specifies number of seconds to wait before downloading changes from the Exchange server.","supportedPlatforms":["Windows"],"tags":["Cached Exchange Mode","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\cached mode","registrySubPath":"download","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Entersecondstowaittodownloadchangesfromserver","uniqueId":3559,"displayName":"Enter seconds to wait to download changes from server","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Entersecondstowaittodownloadchangesfromserver;L_EntersecondstowaitbeforedownloadDefault30sec","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies number of seconds to wait before downloading changes from the Exchange server.","supportedPlatforms":["Windows"],"tags":["Cached Exchange Mode","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Entersecondstowaittouploadchangestoserver;L_EntersecondstowaitbeforeuploadDefault15sec","uniqueId":3556,"displayName":"Enter seconds to wait before upload(Default 15 sec.)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":86400},"dataType":"Integer"},"description":"Specifies number of seconds to wait before uploading changes to the Exchange server.","supportedPlatforms":["Windows"],"tags":["Cached Exchange Mode","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\cached mode","registrySubPath":"upload","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Entersecondstowaittouploadchangestoserver","uniqueId":3557,"displayName":"Enter seconds to wait to upload changes to server","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Entersecondstowaittouploadchangestoserver;L_EntersecondstowaitbeforeuploadDefault15sec","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies number of seconds to wait before uploading changes to the Exchange server.","supportedPlatforms":["Windows"],"tags":["Cached Exchange Mode","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_EquivalentCOMAddin","uniqueId":3832,"displayName":"Deactivate Outlook web add-ins whose equivalent COM or VSTO add-in is installed","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_EquivalentCOMAddin;L_EquivalentCOMAddin2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to deactivate Outlook web add-ins if the associated COM or VSTO add-in is installed.\n\nIf you enable this policy setting, users will not be able to use Outlook web add-ins where the corresponding COM or VSTO add-in is installed and you have provided the following information for each add-in.\n    \"Value name\": Specify the Id of the Outlook web add-in, as noted in its manifest. Note: Do not add {} around the Id.\n    \"Value\": Specify the programmatic ID (ProgID) for the Outlook COM or VSTO add-in.\n\nIf you disable or don't configure this policy setting, users will continue to be able to use any versions of the add-in that are installed.\n\nFor more information about when to use this setting, see https://go.microsoft.com/fwlink/p/?linkid=2156690","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\addins\\equivalentcomaddin","registrySubPath":"policyon","enforcedValues":{"enabled":1}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\addins\\equivalentcomaddin","registrySubPath":"policyon","enforcedValues":{"enabled":1}}]}}},{"id":"outlk16;L_EquivalentCOMAddin;L_EquivalentCOMAddin2","uniqueId":3831,"displayName":"Outlook web add-ins to deactivate","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to deactivate Outlook web add-ins if the associated COM or VSTO add-in is installed.\n\nIf you enable this policy setting, users will not be able to use Outlook web add-ins where the corresponding COM or VSTO add-in is installed and you have provided the following information for each add-in.\n    \"Value name\": Specify the Id of the Outlook web add-in, as noted in its manifest. Note: Do not add {} around the Id.\n    \"Value\": Specify the programmatic ID (ProgID) for the Outlook COM or VSTO add-in.\n\nIf you disable or don't configure this policy setting, users will continue to be able to use any versions of the add-in that are installed.\n\nFor more information about when to use this setting, see https://go.microsoft.com/fwlink/p/?linkid=2156690","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\addins\\equivalentcomaddin","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_Euroencodingforoutgoingmessages","uniqueId":3401,"displayName":"Euro encoding for outgoing messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Euroencodingforoutgoingmessages;L_Whenpreferredencodingdoesnotsupporteuro2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to choose whether to ignore the euro character when auto-detecting the encoding of an outgoing message and the preferred encoding does not support euro.","supportedPlatforms":["Windows"],"tags":["International Options","Mail Format","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Euroencodingforoutgoingmessages;L_Whenpreferredencodingdoesnotsupporteuro2","uniqueId":3400,"displayName":"Auto-select should:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Send messages as UTF 8","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"ignore euro","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This policy setting allows you to choose whether to ignore the euro character when auto-detecting the encoding of an outgoing message and the preferred encoding does not support euro.","supportedPlatforms":["Windows"],"tags":["International Options","Mail Format","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mshtml\\international","registrySubPath":"autodetect_ignoreeuro","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ExchangeUnicodeModeIgnoreOSTFormat;L_ChoosewhetherexistingOSTformatdeterminesmailboxmode","uniqueId":3610,"displayName":"Choose whether existing OST format determines mailbox mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"OST Format determines mode","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Create new OST if format doesn't match mode","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt to create new OST if format doesn't match mode","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify whether existing OST format determines the mailbox mode.\n\nIf you enable this policy setting, you may choose one of these options:\n\n* OST Format determines mode: the format of the user's OST file will be used to determine whether to run in Unicode or ANSI mode.\n* Create new OST if format doesn't match mode: create a new OST file if needed.\n* Prompt to create new OST if format doesn't match mode\n\nIf you disable or do not configure this policy setting, you will not be able to specify whether existing OST format determines the mailbox mode.\n\nThis policy is ignored if PreferANSI is not set and the OST is enabled but either does not exist or is a Unicode OST, because it would be impossible for the user to create an ANSI OST.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\emsp","registrySubPath":"ignoreostformat","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ExchangeUnicodeModeIgnoreOSTFormat","uniqueId":3611,"displayName":"Exchange Unicode Mode - Ignore OST Format","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_ExchangeUnicodeModeIgnoreOSTFormat;L_ChoosewhetherexistingOSTformatdeterminesmailboxmode","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify whether existing OST format determines the mailbox mode.\n\nIf you enable this policy setting, you may choose one of these options:\n\n* OST Format determines mode: the format of the user's OST file will be used to determine whether to run in Unicode or ANSI mode.\n* Create new OST if format doesn't match mode: create a new OST file if needed.\n* Prompt to create new OST if format doesn't match mode\n\nIf you disable or do not configure this policy setting, you will not be able to specify whether existing OST format determines the mailbox mode.\n\nThis policy is ignored if PreferANSI is not set and the OST is enabled but either does not exist or is a Unicode OST, because it would be impossible for the user to create an ANSI OST.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_ExchangeUnicodeModeSilentOSTFormatChange","uniqueId":3612,"displayName":"Exchange Unicode Mode - Silent OST format change","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows .OST files to silently update to Unicode format from ANSI.\n\nIf you enable this policy setting, it will only have meaning if the related policy setting \"Exchange Unicode Mode - Ignore OST format\" is enabled and set to the options listed below.\n\nThe behavior is as follows -\n\n\"Ignore OST Format\" policy setting is enabled and set to \"Create new OST if format doesn't match mode\"; \"Silent OST Format Change\" policy setting is enabled:\nIf Outlook detects a mode that is different than the current .OST mode, then a new .OST is created without prompting the user.\n\n\"Ignore OST Format\" policy setting is enabled and set to \"Prompt to create new OST if format doesn't match mode\"; \"Silent OST Format Change\" policy setting is enabled:\nIf Outlook detects a mode that is different than the current .OST mode, the user is prompted to allow a delay in the conversion to the mode set by policy.  By clicking Ok, a new OST is created without a prompt for a new .OST name.\n\nIf you disable or do not configure this policy setting, users will be prompted to enter a new name for the updated .OST file.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\emsp","registrySubPath":"silentostformatchange","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ExchangeUnicodeModeTurnOffANSI","uniqueId":3609,"displayName":"Exchange Unicode Mode - Turn off ANSI mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls the creation of ANSI OST files.\n\nIf you enable or do not configure this policy setting, new ANSI OST files cannot be created.\n\nIf you disable this policy setting, all new OST files for an Outlook profile are created in ANSI format.\n\nProfiles with multiple Exchange accounts will always create Unicode OST files, regardless of this policy setting.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\emsp","registrySubPath":"preferansi","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Firstdayoftheweek;L_Choosethefirstdayoftheweek","uniqueId":3325,"displayName":"Choose the first day of the week:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sunday","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Monday","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tuesday","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Wednesday","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Thursday","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Friday","description":"","tags":[],"dependencyGroup":null},{"value":6,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Saturday","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"firstdow","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Firstdayoftheweek","uniqueId":3326,"displayName":"First day of the week","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Firstdayoftheweek;L_Choosethefirstdayoftheweek","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Firstweekofyear;L_Choosethefirstweekoftheyear","uniqueId":3327,"displayName":"Choose the first week of the year:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Starts on Jan. 1","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"First full week","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"First four-day week","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"firstwoy","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Firstweekofyear","uniqueId":3328,"displayName":"First week of year","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Firstweekofyear;L_Choosethefirstweekoftheyear","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Foldersizedisplay","uniqueId":3605,"displayName":"Do not display Folder Size button on folder properties dialog box","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Retains/Removes the \"Folder Size\" button in the General tab of the <folder> Properties dialog box.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook","registrySubPath":"chkfldrsize","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ForceSelectionOfAccountBeforeSending","uniqueId":3387,"displayName":"Force selection of account before sending","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting enables you to force users to select an e-mail account from which to send outgoing e-mail.\n\nIf you enable this policy setting, users must choose an e-mail account before they can send an e-mail.\n\nIf you disable or do not configure this policy setting, e-mail is sent from the default e-mail account if users do not select a specific e-mail account.","supportedPlatforms":["Windows"],"tags":["Compose Messages","Mail","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options","registrySubPath":"forceaccountselection","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Fortezzacertificatepolicies;L_Enterlistofpoliciesthatcanbeinthepoliciesextension2","uniqueId":3530,"displayName":"List of policies to indicate that a certificate is a Fortezza certificate","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting specifies a list of policies allowed in the policies extension of a certificate that indicate the certificate is a Fortezza certificate. Fortezza is a hardware--based encryption standard created by the National Security Agency (NSA), a division of the United States Department of Defense. To be valid for use with Fortezza, a certificate must include an appropriate policy in the certificate's policies extension. \n\nIf you enable this policy setting, you can enter a list of policies in the supplied text box that can be used to indicate that a certificate is a Fortezza certificate. The list should be separated by semi-colons. For example: policy1;policy2;policy3. \n\nIf you disable or so nor configure this policy setting, a list of Fortezza certificate policies are not listed.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"fortezza_policies","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_Fortezzacertificatepolicies","uniqueId":3531,"displayName":"Fortezza certificate policies","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Fortezzacertificatepolicies;L_Enterlistofpoliciesthatcanbeinthepoliciesextension2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies a list of policies allowed in the policies extension of a certificate that indicate the certificate is a Fortezza certificate. Fortezza is a hardware--based encryption standard created by the National Security Agency (NSA), a division of the United States Department of Defense. To be valid for use with Fortezza, a certificate must include an appropriate policy in the certificate's policies extension. \n\nIf you enable this policy setting, you can enter a list of policies in the supplied text box that can be used to indicate that a certificate is a Fortezza certificate. The list should be separated by semi-colons. For example: policy1;policy2;policy3. \n\nIf you disable or so nor configure this policy setting, a list of Fortezza certificate policies are not listed.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_General;L_Alwayscheckspellingbeforesending","uniqueId":3407,"displayName":"Always check spelling before sending","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Spelling","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\spelling","registrySubPath":"check","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_General","uniqueId":3409,"displayName":"General","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_General;L_Alwayscheckspellingbeforesending","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_General;L_Ignoreoriginalmessagetextinreplyorforward","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Spelling","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_General;L_Ignoreoriginalmessagetextinreplyorforward","uniqueId":3408,"displayName":"Ignore original message text in reply or forward","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Spelling","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\mailsettings","registrySubPath":"ignorereplyspelling","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_HideAppsStoreButtonInHomeTabRibbon","uniqueId":3411,"displayName":"Hide the Office Store button","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"The Office Store button allows users to get apps for Outlook from the Home tab in the ribbon.\n\nIf you enable this policy setting, the Office Store button doesn’t appear on the Home tab in the ribbon.\n\nIf you disable or don’t configure this policy setting, the Office Store button appears on the Home tab in the ribbon.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\webext","registrySubPath":"storebuttoninribbonhometaballowed","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_HideJunkMailUI","uniqueId":3369,"displayName":"Hide Junk Mail UI","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the Junk E-mail Filter is enabled in Outlook. The Junk E-mail Filter in Outlook is designed to intercept the most obvious junk e-mail, or spam, and send it to users' Junk E-mail folders. The filter evaluates each incoming message based on several factors, including the time when the message was sent and the content of the message. The filter does not single out any particular sender or message type, but instead analyzes each message based on its content and structure to discover whether or not it is probably spam.\n      \nIf you enable this policy setting, junk e-mail filtering in Outlook is turned off entirely, in addition to hiding the filtering controls from users. In addition, you can use the \"Junk E-mail Protection level\" policy setting to preset a filtering level and prevent users from changing it. Note - This policy setting does not affect the configuration of the Microsoft Exchange Server Intelligent Message Filter (IMF), which provides server-level junk e-mail filtering. \n\nIf you disable or do not configure this policy setting, the Junk E-mail Filter in Outlook is enabled.","supportedPlatforms":["Windows"],"tags":["Junk E-mail","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook","registrySubPath":"disableantispam","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_HideluckydayswhenusingRokuyouJapanesecalendar","uniqueId":3340,"displayName":"Hide lucky days when using Rokuyou (Japanese) calendar","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checked: Does not display lucky days when using a Japanese Rokuyou calendar. | Unchecked: Displays lucky days when using a Japanese Rokuyou calendar.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"lunarrokuyou","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_HideNewOutlookToggle","uniqueId":3859,"displayName":"Hide the “Try the new Outlook” toggle in Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the “Try the new Outlook” toggle is displayed in Outlook.\n\nIf you enable this policy setting, the toggle for “Try the new Outlook” will be hidden and users will not have the ability to switch between the existing and new Outlook experiences.\n\nIf you disable or do not configure this policy setting, the toggle for “Try the new Outlook” will be displayed.\n\nNote: This policy only applies to subscription-based Microsoft 365 Apps.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"hidenewoutlooktoggle","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_HidePhotoLink","uniqueId":3412,"displayName":"Hide photo link","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting configures the link to the user's My Site (when detected) where the user's photo can be uploaded.  This link is under the File tab. \n\nIf you enable this policy setting, the link is not visible.\n\nIf you disable or do not configure this policy setting, the link is visible.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options","registrySubPath":"hidephotolink","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_HideQuickStepsGallery","uniqueId":3650,"displayName":"Disable Quick Steps Gallery","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to hide the Quick Steps Gallery in the Ribbon.  By default, the Quick Steps Gallery is included in the Home tab of the Outlook explorer Ribbon. \n\nIf you enable this policy setting, you will hide the Quick Steps Gallery in the Ribbon.\n\nIf you disable or do not configure this policy setting, the Quick Steps Gallery will be included in the Home tab of the Outlook explorer Ribbon.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options","registrySubPath":"disablequickstepsgallery","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_HideSendLatestVersionButton","uniqueId":3309,"displayName":"Hide Send Latest Version button","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting hides the \"Send Latest Version\" button and prevents it from appearing on out-of-date meeting forward notifications and responses.\n\nIf you enable this policy setting, the \"Send Latest Version\" button be hidden on out-of-date meeting forward notifications and responses.  \n\nIf you disable or do not configure this policy setting, the \"Send Latest Version\" button will be turned on.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"hidesendlatestversionbutton","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_HitHighlightingcolor;L_BackgroundColorcolon","uniqueId":3209,"displayName":"Background Color:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Black","description":"","tags":[],"dependencyGroup":null},{"value":12632256,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Silver","description":"","tags":[],"dependencyGroup":null},{"value":8421504,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gray","description":"","tags":[],"dependencyGroup":null},{"value":16777215,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"White","description":"","tags":[],"dependencyGroup":null},{"value":65535,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Aqua","description":"","tags":[],"dependencyGroup":null},{"value":16711808,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Fuchsia","description":"","tags":[],"dependencyGroup":null},{"value":8453888,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Lime","description":"","tags":[],"dependencyGroup":null},{"value":16776960,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yellow","description":"","tags":[],"dependencyGroup":null},{"value":8421376,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Olive","description":"","tags":[],"dependencyGroup":null},{"value":8388736,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Purple","description":"","tags":[],"dependencyGroup":null},{"value":32768,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Green","description":"","tags":[],"dependencyGroup":null},{"value":16711680,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Red","description":"","tags":[],"dependencyGroup":null},{"value":8388608,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Maroon","description":"","tags":[],"dependencyGroup":null},{"value":128,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Navy","description":"","tags":[],"dependencyGroup":null},{"value":32896,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Teal","description":"","tags":[],"dependencyGroup":null},{"value":255,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Blue","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"By default, search matches are highlighted in yellow. This setting allows you to change the color used for highlighting matches in search results.","supportedPlatforms":["Windows"],"tags":["Search Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\search","registrySubPath":"hithighlightingbackgroundcolor","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_HitHighlightingcolor","uniqueId":3210,"displayName":"Change color used to highlight search matches","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_HitHighlightingcolor;L_BackgroundColorcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"By default, search matches are highlighted in yellow. This setting allows you to change the color used for highlighting matches in search results.","supportedPlatforms":["Windows"],"tags":["Search Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_HybridMode","uniqueId":3571,"displayName":"Disable Exchange Fast Access","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to disable Exchange Fast Access, which forces user accounts to access data from a local cache.\n\nIf you enable this policy setting, Exchange Fast Access is not available to any Exchange Accounts on a computer.\n\nIf you disable or do not configure this policy setting, Exchange Fast Access is turned on by default for Exchange Accounts in Cached Exchange Mode.","supportedPlatforms":["Windows"],"tags":["Cached Exchange Mode","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\hybrid","registrySubPath":"localcaching","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_InboxFolderHomePage","uniqueId":3665,"displayName":"Inbox Folder Home Page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_InboxFolderHomePage;L_showassociatedwebpage40","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_InboxFolderHomePage;L_urladdressofassociatedwebpage41","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_InboxFolderHomePage;L_TurnoffInternetExplorersecuritychecksforthiswebpage","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Inbox Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_InboxFolderHomePage;L_showassociatedwebpage40","uniqueId":3662,"displayName":"Show associated web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Inbox Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\inbox","registrySubPath":"show","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_InboxFolderHomePage;L_TurnoffInternetExplorersecuritychecksforthiswebpage","uniqueId":3664,"displayName":"Turn off Windows Internet Explorer security checks for this web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Inbox Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\inbox","registrySubPath":"security","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_InboxFolderHomePage;L_urladdressofassociatedwebpage41","uniqueId":3663,"displayName":"URL address of associated web page:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Inbox Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\inbox","registrySubPath":"url","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_InCachedExchangemakeSendReceiveF9nulloperation","uniqueId":3555,"displayName":"Do not sync in Cached Exchange mode when users click Send/Receive or F9","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, when users click Send/Receive or press F9 for Cached Exchange Mode accounts, Outlook synchronizes with the Exchange server. When this setting is enabled, clicking Send/Receive and pressing F9 do not synchronize with Exchange unless only one folder is being synchronized. Users can continue to use shift-F9 to synchronize the current folder.","supportedPlatforms":["Windows"],"tags":["Cached Exchange Mode","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\cached mode","registrySubPath":"nomanualonlinesync","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Includeappointmentsonlywithinworkinghours","uniqueId":3317,"displayName":"Include appointments only within working hours","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, all appointments in a calendar are included when that calendar is shared through e-mail or by using the Office.com Sharing Service. This setting allows users to publish only appointments that are within users' working hours.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\pubcal","registrySubPath":"showworkinghoursonly","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_IncludeOnlineModeGALinANR","uniqueId":3570,"displayName":"Use the Online Global Address List for Nickname Resolution","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to force Outlook to use the Online Global Address List for ambiguous name resolution when composing messages in Outlook, instead of using the Offline Address Book when it is available.\n\nIf you enable this policy setting, addresses are resolved using the Online Global Address List, which may contain additional information (that the Offline Address Book would not have) that allows an address to be resolved.\n\nIf you disable or do not configure this policy setting, Outlook resolves addresses using the Offline Address Book when it is available.","supportedPlatforms":["Windows"],"tags":["Cached Exchange Mode","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\cached mode","registrySubPath":"anr include online gal","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_InternetAndNetworkPathsIntoHyperlinks","uniqueId":3386,"displayName":"Internet and network paths into hyperlinks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting specifies whether Outlook automatically turns text that represents Internet and network paths into hyperlinks.  This option can also be configured by selecting the “Internet and network paths with hyperlinks” check box that is available on the Outlook | File | Options | Mail | Editor Options.... | Proofing | AutoCorrect Options… | AutoFormat tab on the user interface (UI).\n\nIf you enable or do not configure this policy setting, text in Outlook that represents internet and network paths are automatically turned into hyperlinks.  This is the default behavior of Outlook.\n\nIf you disable this policy setting, text in Outlook that represents internet and network paths are not automatically turned into hyperlinks.","supportedPlatforms":["Windows"],"tags":["Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\autoformat","registrySubPath":"pgrfafo_25_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_InternetFreeBusyOptions","uniqueId":3356,"displayName":"Internet Free/Busy Options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_InternetFreeBusyOptions;L_Publishfreebusyinformation","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_InternetFreeBusyOptions;L_PublishatthisURL","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_InternetFreeBusyOptions;L_SearchatthisURL","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Checks/Unchecks the option \"Publish at my location\".","supportedPlatforms":["Windows"],"tags":["Free/Busy Options","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_InternetFreeBusyOptions;L_PublishatthisURL","uniqueId":3354,"displayName":"Publish at this URL:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Checks/Unchecks the option \"Publish at my location\".","supportedPlatforms":["Windows"],"tags":["Free/Busy Options","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar\\internet free/busy","registrySubPath":"write url","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_InternetFreeBusyOptions;L_Publishfreebusyinformation","uniqueId":3353,"displayName":"Publish free/busy information","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the option \"Publish at my location\".","supportedPlatforms":["Windows"],"tags":["Free/Busy Options","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar\\internet free/busy","registrySubPath":"publish to internet","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_InternetFreeBusyOptions;L_SearchatthisURL","uniqueId":3355,"displayName":"Search at this URL:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Checks/Unchecks the option \"Publish at my location\".","supportedPlatforms":["Windows"],"tags":["Free/Busy Options","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar\\internet free/busy","registrySubPath":"read url","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_JournalFolderHomePage","uniqueId":3686,"displayName":"Journal Folder Home Page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_JournalFolderHomePage;L_showassociatedwebpage54","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_JournalFolderHomePage;L_urladdressofassociatedwebpage55","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_JournalFolderHomePage;L_turnoffinternetexplorersecuritychecksforthiswebpage56","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Journal Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_JournalFolderHomePage;L_showassociatedwebpage54","uniqueId":3683,"displayName":"Show associated web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Journal Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\journal","registrySubPath":"show","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_JournalFolderHomePage;L_turnoffinternetexplorersecuritychecksforthiswebpage56","uniqueId":3685,"displayName":"Turn off Windows Internet Explorer security checks for this web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Journal Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\journal","registrySubPath":"security","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_JournalFolderHomePage;L_urladdressofassociatedwebpage55","uniqueId":3684,"displayName":"URL address of associated web page:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Journal Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\journal","registrySubPath":"url","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_JunkEmailprotectionlevel","uniqueId":3372,"displayName":"Junk E-mail protection level","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_JunkEmailprotectionlevel;L_Selectlevel","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls your Junk E-mail protection level. The Junk E-mail Filter in Outlook helps to prevent junk e-mail messages, also known as spam, from cluttering user's Inbox. The filter evaluates each incoming message based on several factors, including the time when the message was sent and the content of the message. The filter does not single out any particular sender or message type, but instead analyzes each message based on its content and structure to discover whether or not it is probably spam.\n\nIf you enable this policy setting, you can select one of the four listed options available. After you select an option, users will not be able to change it.\n\nIf you disable this policy setting, Outlook reverts to the user-defined protection level.\n\nIf you do not configure this policy setting, users can change their junk e-mail filtering options.","supportedPlatforms":["Windows"],"tags":["Junk E-mail","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_JunkEmailprotectionlevel;L_Selectlevel","uniqueId":3371,"displayName":"Select level:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":4294967295,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No Protection","description":"","tags":[],"dependencyGroup":null},{"value":6,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Low (Default)","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"High","description":"","tags":[],"dependencyGroup":null},{"value":2147483648,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Trusted Lists Only","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":4294967295,"description":"This policy setting controls your Junk E-mail protection level. The Junk E-mail Filter in Outlook helps to prevent junk e-mail messages, also known as spam, from cluttering user's Inbox. The filter evaluates each incoming message based on several factors, including the time when the message was sent and the content of the message. The filter does not single out any particular sender or message type, but instead analyzes each message based on its content and structure to discover whether or not it is probably spam.\n\nIf you enable this policy setting, you can select one of the four listed options available. After you select an option, users will not be able to change it.\n\nIf you disable this policy setting, Outlook reverts to the user-defined protection level.\n\nIf you do not configure this policy setting, users can change their junk e-mail filtering options.","supportedPlatforms":["Windows"],"tags":["Junk E-mail","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"junkmailprotection","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_JunkMailImportList","uniqueId":3376,"displayName":"Trigger to apply junk email list settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to trigger the activation of other junk e-mail policy settings.\n\nIf you enable this policy setting, you will trigger the activation of other junk e-mail policy settings. For example, if you configure the \"Specify path to Safe Senders list\" policy setting, the specified Safe Senders list is not imported by Outlook unless you also enable the \"Junk Mail Import List\" policy setting.\n\nIf you disable or do not configure this policy setting, you will not trigger the activation of other junk e-mail policies.","supportedPlatforms":["Windows"],"tags":["Junk E-mail","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"junkmailimportlists","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_KeepsearchfoldersinExchangeonline","uniqueId":3706,"displayName":"Keep Search Folders in Exchange online","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_KeepsearchfoldersinExchangeonline;L_SpecifydaystokeepfoldersaliveinExchangeonlinemode","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the number of days to keep a Search Folder active when running in online mode.  After a Search Folder has not been accessed for the specified number of days, it becomes dormant and no longer remains up-to-date with current contents of folders (viewing the Search Folder makes it active again and restarts the timer).\n\nIf you enable this policy setting, you may specify the number of days to keep a Search Folder active when running in online mode.\n\nIf you disable or do not configure this policy setting, then Search Folders always remain dormant.","supportedPlatforms":["Windows"],"tags":["Search Folders","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_KeepsearchfoldersinExchangeonline;L_SpecifydaystokeepfoldersaliveinExchangeonlinemode","uniqueId":3705,"displayName":"Specify days to keep folders alive in Exchange online mode:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":1000},"dataType":"Integer"},"description":"This policy setting allows you to specify the number of days to keep a Search Folder active when running in online mode.  After a Search Folder has not been accessed for the specified number of days, it becomes dormant and no longer remains up-to-date with current contents of folders (viewing the Search Folder makes it active again and restarts the timer).\n\nIf you enable this policy setting, you may specify the number of days to keep a Search Folder active when running in online mode.\n\nIf you disable or do not configure this policy setting, then Search Folders always remain dormant.","supportedPlatforms":["Windows"],"tags":["Search Folders","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"searchonlinekeepalivedays","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Keepsearchfoldersoffline","uniqueId":3704,"displayName":"Keep Search Folders offline","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Keepsearchfoldersoffline;L_Specifydaystokeepfoldersaliveinofflineorcachedmode","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the number of days to keep a Search Folder active when running in offline or cached mode.  After a Search Folder has not been accessed for the specified number of days, it becomes dormant and no longer remains up-to-date with current contents of folders (viewing the Search Folder makes it active again and restarts the timer).\n\nIf you enable this policy setting, you may specify the number of days to keep a Search Folder active when running in offline mode.\n\nIf you disable or do not configure this policy setting, then Search Folders always remain dormant.","supportedPlatforms":["Windows"],"tags":["Search Folders","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Keepsearchfoldersoffline;L_Specifydaystokeepfoldersaliveinofflineorcachedmode","uniqueId":3703,"displayName":"Specify days to keep folders alive in offline or cached mode:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":999},"dataType":"Integer"},"description":"This policy setting allows you to specify the number of days to keep a Search Folder active when running in offline or cached mode.  After a Search Folder has not been accessed for the specified number of days, it becomes dormant and no longer remains up-to-date with current contents of folders (viewing the Search Folder makes it active again and restarts the timer).\n\nIf you enable this policy setting, you may specify the number of days to keep a Search Folder active when running in offline mode.\n\nIf you disable or do not configure this policy setting, then Search Folders always remain dormant.","supportedPlatforms":["Windows"],"tags":["Search Folders","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"searchofflinekeepalivedays","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_LargePSTAbsolutemaximumsize;L_EnterabsolutemaximumsizeforPSTinmegabytes2","uniqueId":3756,"displayName":"(0 - 4,294,967,295 MB)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":4294967295},"dataType":"Integer"},"description":"Specifies the maximum allowable size (in megabytes) for an Outlook Data File.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\pst","registrySubPath":"maxlargefilesize","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_LargePSTAbsolutemaximumsize","uniqueId":3757,"displayName":"Large PST: Absolute maximum size","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_LargePSTAbsolutemaximumsize;L_EnterabsolutemaximumsizeforPSTinmegabytes2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the maximum allowable size (in megabytes) for an Outlook Data File.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_LargePSTSizetodisableaddingnewcontent;L_EntersizetodisableaddingnewcontenttoPSTinmegabytes2","uniqueId":3758,"displayName":"(0 - 4,294,967,295 MB)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":4294967295},"dataType":"Integer"},"description":"Specifies the size at which Outlook will no longer accept new content into an Outlook Data File.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\pst","registrySubPath":"warnlargefilesize","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_LargePSTSizetodisableaddingnewcontent","uniqueId":3759,"displayName":"Large PST: Size to disable adding new content","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_LargePSTSizetodisableaddingnewcontent;L_EntersizetodisableaddingnewcontenttoPSTinmegabytes2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the size at which Outlook will no longer accept new content into an Outlook Data File.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_LayoutOptions","uniqueId":3452,"displayName":"Layout Options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_LayoutOptions;L_Setlayoutdirection","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_LayoutOptions;L_Setglobaltextdirection","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Right-to-left","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_LayoutOptions;L_Setglobaltextdirection","uniqueId":3451,"displayName":"Set global text direction:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Context-based","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Left to right","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Right-to-left","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Right-to-left","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"text direction","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_LayoutOptions;L_Setlayoutdirection","uniqueId":3450,"displayName":"Set layout direction","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Left to Right","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Right to Left","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Right-to-left","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"calendar direction","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_LegacyPSTAbsolutemaximumsize;L_EnterabsolutemaximumsizeforPSTinbytes2","uniqueId":3760,"displayName":"(0 - 2,075,149,312 bytes)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":2075149312},"dataType":"Integer"},"description":"Specifies the maximum allowable size (in bytes) for an Outlook 97-2002 Data File.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\pst","registrySubPath":"maxfilesize","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_LegacyPSTAbsolutemaximumsize","uniqueId":3761,"displayName":"Legacy PST: Absolute maximum size","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_LegacyPSTAbsolutemaximumsize;L_EnterabsolutemaximumsizeforPSTinbytes2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the maximum allowable size (in bytes) for an Outlook 97-2002 Data File.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_LegacyPSTSizetodisableaddingnewcontent;L_EntersizetodisableaddingnewcontenttoPSTinbytes2","uniqueId":3762,"displayName":"(0 - 2,075,149,312 Bytes)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":2075149312},"dataType":"Integer"},"description":"Specifies the size at which Outlook will no longer accept new content into an Outlook Data File.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\pst","registrySubPath":"warnfilesize","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_LegacyPSTSizetodisableaddingnewcontent","uniqueId":3763,"displayName":"Legacy PST: Size to disable adding new content","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_LegacyPSTSizetodisableaddingnewcontent;L_EntersizetodisableaddingnewcontenttoPSTinbytes2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the size at which Outlook will no longer accept new content into an Outlook Data File.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Level1AddFilePolicy;L_AdditionalExtensions","uniqueId":3462,"displayName":"Additional Extensions:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting controls which types of attachments (determined by file extension) Outlook prevents from being delivered. \n\nOutlook uses two levels of security to restrict user's access to files attached to e-mail messages or other items. Files with specific extensions can be categorized as Level 1 (users cannot view the file) or Level 2 (users can open the file after saving it to disk). Users can freely open files of types that are not categorized as Level 1 or Level 2. \n\nIf you enable this policy setting, you can specify additional file type extensions as Level 1--that is, to be blocked from delivery--by entering them in the text field provided separated by semicolons. \n\nIf you disable or do not configure this policy setting, Outlook classifies a number of potentially harmful file types (such as those with .exe, .reg, and .vbs extensions) as Level 1 and blocks files with those extensions from being delivered. Important: This policy setting only applies if the \"Outlook Security Mode\" policy setting under \"Microsoft Outlook 2016\\Security\\Security Form Settings\" is configured to \"Use Outlook Security Group Policy.\"","supportedPlatforms":["Windows"],"tags":["Attachment Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"fileextensionsaddlevel1","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_Level1AddFilePolicy","uniqueId":3463,"displayName":"Add file extensions to block as Level 1","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Level1AddFilePolicy;L_AdditionalExtensions","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls which types of attachments (determined by file extension) Outlook prevents from being delivered. \n\nOutlook uses two levels of security to restrict user's access to files attached to e-mail messages or other items. Files with specific extensions can be categorized as Level 1 (users cannot view the file) or Level 2 (users can open the file after saving it to disk). Users can freely open files of types that are not categorized as Level 1 or Level 2. \n\nIf you enable this policy setting, you can specify additional file type extensions as Level 1--that is, to be blocked from delivery--by entering them in the text field provided separated by semicolons. \n\nIf you disable or do not configure this policy setting, Outlook classifies a number of potentially harmful file types (such as those with .exe, .reg, and .vbs extensions) as Level 1 and blocks files with those extensions from being delivered. Important: This policy setting only applies if the \"Outlook Security Mode\" policy setting under \"Microsoft Outlook 2016\\Security\\Security Form Settings\" is configured to \"Use Outlook Security Group Policy.\"","supportedPlatforms":["Windows"],"tags":["Attachment Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Level1Attachments","uniqueId":3457,"displayName":"Display Level 1 attachments","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting controls whether Outlook blocks potentially dangerous attachments designated Level 1. \nOutlook uses two levels of security to restrict users' access to files attached to e-mail messages or other items. Files with specific extensions can be categorized as Level 1 (users cannot view the file) or Level 2 (users can open the file after saving it to disk). Users can freely open files of types that are not categorized as Level 1 or Level 2. \n \nIf you enable this policy setting, Outlook users can gain access to Level 1 file type attachments by first saving the attachments to disk and then opening them, as with Level 2 attachments. \n\nIf you disable this policy setting, Level 1 attachments do not display under any circumstances. \n\nIf you do not configure this policy setting, Outlook completely blocks access to Level 1 files, and requires users to save Level 2 files to disk before opening them.","supportedPlatforms":["Windows"],"tags":["Attachment Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"showlevel1attach","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Level1RemoveFilePolicy","uniqueId":3465,"displayName":"Remove file extensions blocked as Level 1","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Level1RemoveFilePolicy;L_RemovedExtensions","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls which types of attachments (determined by file extension) Outlook prevents from being delivered. \n\nOutlook uses two levels of security to restrict user's access to files attached to e-mail messages or other items. Files with specific extensions can be categorized as Level 1 (users cannot view the file) or Level 2 (users can open the file after saving it to disk). Users can freely open files of types that are not categorized as Level 1 or Level 2. \n\nIf you enable this policy setting, you can specify the removal of file type extensions that Outlook classifies as Level 1 (that is, to be blocked from delivery) entering them in the text field provided separated by semicolons. \n\nIf you disable or do not configure this policy setting, Outlook classifies a number of potentially harmful file types (such as those with .exe, .reg, and .vbs extensions) as Level 1 and blocks files with those extensions from being delivered. \nImportant: This policy setting only applies if the \"Outlook Security Mode\" policy setting under \"Microsoft Outlook 2016\\Security\\Security Form Settings\" is configured to \"Use Outlook Security Group Policy.\"","supportedPlatforms":["Windows"],"tags":["Attachment Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Level1RemoveFilePolicy;L_RemovedExtensions","uniqueId":3464,"displayName":"Removed Extensions:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"recommendedValues":[{"value":";","recommendation":"security"}],"description":"This policy setting controls which types of attachments (determined by file extension) Outlook prevents from being delivered. \n\nOutlook uses two levels of security to restrict user's access to files attached to e-mail messages or other items. Files with specific extensions can be categorized as Level 1 (users cannot view the file) or Level 2 (users can open the file after saving it to disk). Users can freely open files of types that are not categorized as Level 1 or Level 2. \n\nIf you enable this policy setting, you can specify the removal of file type extensions that Outlook classifies as Level 1 (that is, to be blocked from delivery) entering them in the text field provided separated by semicolons. \n\nIf you disable or do not configure this policy setting, Outlook classifies a number of potentially harmful file types (such as those with .exe, .reg, and .vbs extensions) as Level 1 and blocks files with those extensions from being delivered. \nImportant: This policy setting only applies if the \"Outlook Security Mode\" policy setting under \"Microsoft Outlook 2016\\Security\\Security Form Settings\" is configured to \"Use Outlook Security Group Policy.\"","supportedPlatforms":["Windows"],"tags":["Attachment Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"fileextensionsremovelevel1","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_Level2AddFilePolicy;L_additionalextensions23","uniqueId":3466,"displayName":"Additional Extensions:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting controls which types of attachments (determined by file extension) must be saved to disk before users can open them.  Files with specific extensions can be categorized as Level 1 (users cannot view the file) or Level 2 (users can open the file after saving it to disk). Users can freely open files of types that are not categorized as Level 1 or Level 2. \n\nIf you enable this policy setting, you can specify a list of attachment file types to classify as Level 2, which forces users to actively decide to download the attachment to view it. \n\nIf you disable or do not configure this policy setting, Outlook does not classify any file type extensions as Level 2. \n\nImportant: This policy setting only applies if the \"Outlook Security Mode\" policy setting under \"Microsoft Outlook 2016\\Security\\Security Form Settings\" is configured to \"Use Outlook Security Group Policy.\"","supportedPlatforms":["Windows"],"tags":["Attachment Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"fileextensionsaddlevel2","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_Level2AddFilePolicy","uniqueId":3467,"displayName":"Add file extensions to block as Level 2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Level2AddFilePolicy;L_additionalextensions23","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls which types of attachments (determined by file extension) must be saved to disk before users can open them.  Files with specific extensions can be categorized as Level 1 (users cannot view the file) or Level 2 (users can open the file after saving it to disk). Users can freely open files of types that are not categorized as Level 1 or Level 2. \n\nIf you enable this policy setting, you can specify a list of attachment file types to classify as Level 2, which forces users to actively decide to download the attachment to view it. \n\nIf you disable or do not configure this policy setting, Outlook does not classify any file type extensions as Level 2. \n\nImportant: This policy setting only applies if the \"Outlook Security Mode\" policy setting under \"Microsoft Outlook 2016\\Security\\Security Form Settings\" is configured to \"Use Outlook Security Group Policy.\"","supportedPlatforms":["Windows"],"tags":["Attachment Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Level2RemoveFilePolicy","uniqueId":3469,"displayName":"Remove file extensions blocked as Level 2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Level2RemoveFilePolicy;L_removedextensions25","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls which types of attachments (determined by file extension) must be saved to disk before users can open them.  Files with specific extensions can be categorized as Level 1 (users cannot view the file) or Level 2 (users can open the file after saving it to disk). Users can freely open files of types that are not categorized as Level 1 or Level 2. \n\nIf you enable this policy setting, you can specify a list of attachment file types to classify as Level 2, which forces users to actively decide to download the attachment to view it. \n\nIf you disable or do not configure this policy setting, Outlook does not classify any file type extensions as Level 2. \n\nImportant: This policy setting only applies if the \"Outlook Security Mode\" policy setting under \"Microsoft Outlook 2016\\Security\\Security Form Settings\" is configured to \"Use Outlook Security Group Policy.\"","supportedPlatforms":["Windows"],"tags":["Attachment Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Level2RemoveFilePolicy;L_removedextensions25","uniqueId":3468,"displayName":"Removed Extensions:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"recommendedValues":[{"value":";","recommendation":"security"}],"description":"This policy setting controls which types of attachments (determined by file extension) must be saved to disk before users can open them.  Files with specific extensions can be categorized as Level 1 (users cannot view the file) or Level 2 (users can open the file after saving it to disk). Users can freely open files of types that are not categorized as Level 1 or Level 2. \n\nIf you enable this policy setting, you can specify a list of attachment file types to classify as Level 2, which forces users to actively decide to download the attachment to view it. \n\nIf you disable or do not configure this policy setting, Outlook does not classify any file type extensions as Level 2. \n\nImportant: This policy setting only applies if the \"Outlook Security Mode\" policy setting under \"Microsoft Outlook 2016\\Security\\Security Form Settings\" is configured to \"Use Outlook Security Group Policy.\"","supportedPlatforms":["Windows"],"tags":["Attachment Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"fileextensionsremovelevel2","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_Listoferrormessagestocustomize","uniqueId":3649,"displayName":"List of error messages to customize","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Listoferrormessagestocustomize;L_listoferrormessagestocustomize37","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines a list of custom error messages to activate.","supportedPlatforms":["Windows"],"tags":["Customizable Error Messages","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Listoferrormessagestocustomize;L_listoferrormessagestocustomize37","uniqueId":3648,"displayName":"List of error messages to customize","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"Defines a list of custom error messages to activate.","supportedPlatforms":["Windows"],"tags":["Customizable Error Messages","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\customizablealerts","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_ListOfManagedAddins","uniqueId":3797,"displayName":"List of managed add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_ListOfManagedAddins;L_ListOfManagedAddins2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify which add-ins are always enabled, always disabled (blocked), or configurable by the user. To block add-ins that are not managed by this policy setting, you must also configure the \"Block all unmanaged add-ins\" policy setting.\n\nTo enable this policy setting, provide the following information for each add-in:\n\nIn \"Value name,\" specify the programmatic identifier (ProgID) for COM add-ins.\n\nTo obtain the ProgID for an add-in, use Registry Editor on the client computer where the add-in is installed to locate key names under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Office\\Outlook\\Addins or HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Office\\Outlook\\Addins.\n\nYou can also obtain the ProgID of an add-in by using Office Telemetry Dashboard.\n\nIn \"Value,\" specify the value as follows:\n\nTo specify that an add-in is always disabled (blocked), type 0.\n\nTo specify that an add-in is always enabled, type 1.\n\nTo specify that an add-in is configurable by the user and not blocked by the \"Block all unmanaged add-ins\" policy setting when enabled, type 2.\n\nIf you disable or do not enable this policy setting, the list of managed add-ins is deleted. If the \"Block all unmanaged add-ins\" policy setting is enabled, then all add-ins are blocked.\n\nAdd-ins that are disabled by this policy will never be disabled by the Outlook add-in disabling feature, which disables add-ins for performance, resiliency, or reliability reasons.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\resiliency\\addinlist","registrySubPath":"policyon","enforcedValues":{"enabled":1}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\resiliency\\addinlist","registrySubPath":"policyon","enforcedValues":{"enabled":1}}]}}},{"id":"outlk16;L_ListOfManagedAddins;L_ListOfManagedAddins2","uniqueId":3796,"displayName":"List of managed add-ins","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to specify which add-ins are always enabled, always disabled (blocked), or configurable by the user. To block add-ins that are not managed by this policy setting, you must also configure the \"Block all unmanaged add-ins\" policy setting.\n\nTo enable this policy setting, provide the following information for each add-in:\n\nIn \"Value name,\" specify the programmatic identifier (ProgID) for COM add-ins.\n\nTo obtain the ProgID for an add-in, use Registry Editor on the client computer where the add-in is installed to locate key names under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Office\\Outlook\\Addins or HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Office\\Outlook\\Addins.\n\nYou can also obtain the ProgID of an add-in by using Office Telemetry Dashboard.\n\nIn \"Value,\" specify the value as follows:\n\nTo specify that an add-in is always disabled (blocked), type 0.\n\nTo specify that an add-in is always enabled, type 1.\n\nTo specify that an add-in is configurable by the user and not blocked by the \"Block all unmanaged add-ins\" policy setting when enabled, type 2.\n\nIf you disable or do not enable this policy setting, the list of managed add-ins is deleted. If the \"Block all unmanaged add-ins\" policy setting is enabled, then all add-ins are blocked.\n\nAdd-ins that are disabled by this policy will never be disabled by the Outlook add-in disabling feature, which disables add-ins for performance, resiliency, or reliability reasons.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\resiliency\\addinlist","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_Locationofitemsdeletedbydelegates","uniqueId":3200,"displayName":"Store deleted items in owner's mailbox instead of delegate's mailbox","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":8,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy setting allows you to store deleted items in the owner's mailbox instead of the delegate's mailbox.\n\nIf you enable this policy setting, deleted items are stored in the owner's Deleted Items folder.  For this setting to work correctly, the owner must also give the delegate permission to write to the owner's Deleted Items folder.\n\nIf you disable or do not configure this policy setting, items deleted by a delegate are stored in the delegate's Deleted Items Folder instead of the owner's Deleted Items folder.","supportedPlatforms":["Windows"],"tags":["Delegates","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"delegatewastebasketstyle","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Lockedformregions;L_empty76","uniqueId":3726,"displayName":"Locked form regions","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to configure adjoining form regions to be always expanded.\n\nIf you enable this policy setting, you may enter the adjoining form region name as the Value name and the Value data as \"1\" (without quotes).  This ensures that users see the whole adjoining form region and cannot collapse it.  This works for both Explorer and Inspector.\n\nIf you disable or do not configure this policy setting, adjoining form regions are not expanded.","supportedPlatforms":["Windows"],"tags":["Form Region Settings","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\addins\\lockedformregions","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_Lockedformregions","uniqueId":3727,"displayName":"Locked form regions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Lockedformregions;L_empty76","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure adjoining form regions to be always expanded.\n\nIf you enable this policy setting, you may enter the adjoining form region name as the Value name and the Value data as \"1\" (without quotes).  This ensures that users see the whole adjoining form region and cannot collapse it.  This works for both Explorer and Inspector.\n\nIf you disable or do not configure this policy setting, adjoining form regions are not expanded.","supportedPlatforms":["Windows"],"tags":["Form Region Settings","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_LogSharePointsyncRequestsandResponses","uniqueId":3647,"displayName":"Log SharePoint sync requests and responses","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether sync requests and responses between Outlook and SharePoint are logged.  Log files can help diagnose problems with Outlook and SharePoint interactions. Each log file links to one or more XML files (also in the TEMP directory) containing detailed server response and error information. The XML filename is based on the corresponding log file; you can obtain all related diagnostic files by copying all *-wss-*.* files from the TEMP directory.\n\nIf you enable this policy setting, Outlook logs most sync requests and responses to a log file stored in the user's TEMP directory. One log file is created per session (up to seven total), using the naming convention: 0-wss-sync-log.HTM, 1-wss-sync-log.HTM, etc. \n\nIf you disable or do not configure this policy setting, sync requests and responses between Outlook and SharePoint are not logged.","supportedPlatforms":["Windows"],"tags":["SharePoint Lists","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"enablewsssynclogging","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Loop_Outlook","uniqueId":5395,"displayName":"Create and view Loop files in Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can create and view Loop files in Outlook.\n\nNote: This policy setting is ignored if the \"Create and view Loop files in Microsoft apps that support Loop\" policy setting is set to Disabled. If the \"Create and view Loop files in Microsoft apps that support Loop\" policy setting is set to Enabled or Not Configured, this policy setting takes precedence.\n\nIf you enable this policy setting, users can create and view Loop files in Outlook.\n\nIf you disable this policy setting, users can’t create new Loop files in Outlook. Also, Outlook won’t provide live access to view and edit Loop components when a link to a Loop file is shared or displayed.\n\nIf you don’t configure this policy setting, users can create and view Loop files in Outlook.\n\nNote: You can also control Loop by using the SharePoint PowerShell module. For more information, see https://go.microsoft.com/fwlink/?linkid=2204781. To maintain the best user experience, we recommend you configure this policy setting and the SharePoint setting the same.","supportedPlatforms":["Windows","Mac","iOS","Android","Web"],"tags":["LoopOutlook","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\loop","registrySubPath":"LoopOutlook","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Mailaccountoptions","uniqueId":3384,"displayName":"Mail account options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Send messages immediately when connected","supportedPlatforms":["Windows"],"tags":["Mail Setup","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"send mail immediately","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_MailTipsBarDisplayOption","uniqueId":3231,"displayName":"MailTips bar display options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_MailTipsBarDisplayOption;L_MailTipsBarDisplayOptions","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\n        This policy setting controls MailTips bar display options. If the \"Disable MailTips\" policy is also enabled, this policy takes precedence.\n\n        If you enable this policy setting, you can choose from three options for determining how the MailTips bar will display:\n\n        - Display automatically when MailTips apply\n        - Display at all times\n        - Never Display MailTips\n\n        If you disable or do not configure this policy setting, users can choose how the MailTips bar will display.\n      ","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_MailTipsBarDisplayOption;L_MailTipsBarDisplayOptions","uniqueId":3230,"displayName":"MailTips bar display options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Display automatically when MailTips apply","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Display at all times","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Never display MailTips","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"\n        This policy setting controls MailTips bar display options. If the \"Disable MailTips\" policy is also enabled, this policy takes precedence.\n\n        If you enable this policy setting, you can choose from three options for determining how the MailTips bar will display:\n\n        - Display automatically when MailTips apply\n        - Display at all times\n        - Never Display MailTips\n\n        If you disable or do not configure this policy setting, users can choose how the MailTips bar will display.\n      ","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"mailtipsbardisplayoption","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_MakeOutlookthedefaultprogramforEmailContactsandCalendar","uniqueId":3416,"displayName":"Make Outlook the default program for E-mail, Contacts, and Calendar","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook is the default program for e-mail, contacts, and calendar services.\n\nIf you enable this policy setting, the \"Make Outlook the default program for E-mail, Contacts, and Calendar\" check box on the General tab of the Office Center is selected and users cannot change it.\n\nIf you disable this policy setting, users cannot make Outlook the default program for these services.\n\nIf you do not configure this policy setting, Outlook is made the default program for e-mail, contacts, and calendar services when it is installed, although users can designate other programs as the default programs for these services.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"check default client","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ManagingCategoriesduringe_mailexchanges;L_AcceptCategoriesassignedtoincomingmailbythesender","uniqueId":3738,"displayName":"Accept Categories assigned to incoming mail by the sender","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"By default, categories on incoming e-mail are removed, and categories are removed when replying to or forwarding an e-mail.  This setting allows you to control how categories are shared as users exchange e-mail messages. You can specify that categories are not removed for users' incoming e-mail. You can also specify that e-mail messages that users reply to or forward retain the categories on the original message.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"msoridolacceptcategories","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ManagingCategoriesduringe_mailexchanges","uniqueId":3740,"displayName":"Managing Categories during e-mail exchanges","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_ManagingCategoriesduringe_mailexchanges;L_AcceptCategoriesassignedtoincomingmailbythesender","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_ManagingCategoriesduringe_mailexchanges;L_Whenreplyingtoandforwardingmailincludepersonalcategories","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"By default, categories on incoming e-mail are removed, and categories are removed when replying to or forwarding an e-mail.  This setting allows you to control how categories are shared as users exchange e-mail messages. You can specify that categories are not removed for users' incoming e-mail. You can also specify that e-mail messages that users reply to or forward retain the categories on the original message.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_ManagingCategoriesduringe_mailexchanges;L_Whenreplyingtoandforwardingmailincludepersonalcategories","uniqueId":3739,"displayName":"When replying to and forwarding mail, include personal categories","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"By default, categories on incoming e-mail are removed, and categories are removed when replying to or forwarding an e-mail.  This setting allows you to control how categories are shared as users exchange e-mail messages. You can specify that categories are not removed for users' incoming e-mail. You can also specify that e-mail messages that users reply to or forward retain the categories on the original message.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"sendpersonalcategories","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_MaximumNumberofOnlineSearchFolderspermailbox","uniqueId":3708,"displayName":"Maximum Number of Online Search Folders per mailbox","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_MaximumNumberofOnlineSearchFolderspermailbox;L_SpecifymaximumnumberofSearchFolders2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the maximum number of Search Folders that run on the Exchange server. The number of Search Folders running on the client computer is not affected.","supportedPlatforms":["Windows"],"tags":["Search Folders","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_MaximumNumberofOnlineSearchFolderspermailbox;L_SpecifymaximumnumberofSearchFolders2","uniqueId":3707,"displayName":"Maximum number of Search Folders:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":999},"dataType":"Integer"},"defaultValue":"999","description":"Specifies the maximum number of Search Folders that run on the Exchange server. The number of Search Folders running on the client computer is not affected.","supportedPlatforms":["Windows"],"tags":["Search Folders","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"searchmaxnumberonline","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_MeetingPlanner","uniqueId":3348,"displayName":"Meeting Planner","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_MeetingPlanner;L_Showpopupcalendardetails","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_MeetingPlanner;L_Showcalendardetailsinthegrid","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Planner Options","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_MeetingPlanner;L_Showcalendardetailsinthegrid","uniqueId":3347,"displayName":"Show calendar details in the grid","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Planner Options","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"meetmode show details in grid","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_MeetingPlanner;L_Showpopupcalendardetails","uniqueId":3346,"displayName":"Show popup calendar details","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Planner Options","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"meetmode show popup details","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_MeetingRequestsusingiCalendar","uniqueId":3333,"displayName":"Send Internet meeting requests using iCalendar format","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether users' meeting requests sent outside of your organization use the iCalendar format.\n\nIf you enable or do not configure this policy setting, meeting requests sent outside of your organization use the ICAL format.\n\nIf you disable this policy setting, meeting requests sent outside your organization use the TNEF format.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"sendmtgasical","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Messageformateditor","uniqueId":3395,"displayName":"Set message format","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Messageformateditor;L_UsethefollowingFormatEditorforemailmessages","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls the default message format in Outlook. \n\nIf you do not configure this policy setting, new e-mail messages in Outlook are formatted as HTML. \n\nIf you enable this policy setting, you can set the default e-mail format in Outlook to HTML, Rich Text, or plain text. Users can choose a format other than the default when composing messages. \n\nIf you disable this policy setting, Outlook uses HTML as the default e-mail format and users will not be able to change it. \n\nIf you do not configure this policy setting, Outlook uses HTML as the default e-mail format, but users can choose a format other than the default when composing messages.","supportedPlatforms":["Windows"],"tags":["Message Format","Internet Formatting","Mail Format","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Messageformateditor;L_UsethefollowingFormatEditorforemailmessages","uniqueId":3394,"displayName":"Use the following format for e-mail messages:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":131072,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"HTML","description":"","tags":[],"dependencyGroup":null},{"value":196608,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Rich Text","description":"","tags":[],"dependencyGroup":null},{"value":65536,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Plain Text","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":131072,"description":"This policy setting controls the default message format in Outlook. \n\nIf you do not configure this policy setting, new e-mail messages in Outlook are formatted as HTML. \n\nIf you enable this policy setting, you can set the default e-mail format in Outlook to HTML, Rich Text, or plain text. Users can choose a format other than the default when composing messages. \n\nIf you disable this policy setting, Outlook uses HTML as the default e-mail format and users will not be able to change it. \n\nIf you do not configure this policy setting, Outlook uses HTML as the default e-mail format, but users can choose a format other than the default when composing messages.","supportedPlatforms":["Windows"],"tags":["Message Format","Internet Formatting","Mail Format","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"editorpreference","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_MessageFormats","uniqueId":3511,"displayName":"Message Formats","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_MessageFormats;L_Supportthefollowingmessageformats","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls which message encryption formats Outlook can use. Outlook supports three formats for encrypting and signing messages: S/MIME, Exchange, and Fortezza.\n\nIf you enable this policy setting, you can specify whether Outlook can use S/MIME (the default), Exchange, or Fortezza encryption, or any combination of any of these options. Users will not be able to change this configuration.\n\nIf you disable or do not configure this policy setting, Outlook only uses S/MIME to encrypt and sign messages. If you disable this policy setting, users will not be able to change this configuration.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_MessageFormats;L_Supportthefollowingmessageformats","uniqueId":3510,"displayName":"Support the following message formats:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"S/MIME","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Exchange","description":"","tags":[],"dependencyGroup":null},{"value":20,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Fortezza","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"S/MIME and Exchange","description":"","tags":[],"dependencyGroup":null},{"value":21,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"S/MIME and Fortezza","description":"","tags":[],"dependencyGroup":null},{"value":22,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Exchange and Fortezza","description":"","tags":[],"dependencyGroup":null},{"value":23,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"S/MIME, Exchange, and Fortezza","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This policy setting controls which message encryption formats Outlook can use. Outlook supports three formats for encrypting and signing messages: S/MIME, Exchange, and Fortezza.\n\nIf you enable this policy setting, you can specify whether Outlook can use S/MIME (the default), Exchange, or Fortezza encryption, or any combination of any of these options. Users will not be able to change this configuration.\n\nIf you disable or do not configure this policy setting, Outlook only uses S/MIME to encrypt and sign messages. If you disable this policy setting, users will not be able to change this configuration.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"msgformats","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Messagehandling;L_aftermovingordeletinganopenitem0","uniqueId":3218,"displayName":"After moving or deleting an open item:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open the next item","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Return to the current folder","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open the previous item","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"You can use this setting to specify various options for how e-mail messages are handled.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"aftermove","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Messagehandling;L_Automaticallycleanupplaintextmessages","uniqueId":3222,"displayName":"Automatically clean up plain text messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"You can use this setting to specify various options for how e-mail messages are handled.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"autoformatplaintext","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Messagehandling;L_Autosaveunsenteveryxxminutes0NoAutoSave","uniqueId":3221,"displayName":"Autosave unsent every xx minutes (0=No AutoSave):","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":99},"dataType":"Integer"},"description":"You can use this setting to specify various options for how e-mail messages are handled.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"autosavetime","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Messagehandling;L_Closeoriginalmessagewhenreplyorforward","uniqueId":3219,"displayName":"Close original message when reply or forward","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"You can use this setting to specify various options for how e-mail messages are handled.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"closeorig","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Messagehandling","uniqueId":3223,"displayName":"Message handling","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Messagehandling;L_aftermovingordeletinganopenitem0","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Messagehandling;L_Closeoriginalmessagewhenreplyorforward","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Messagehandling;L_SavecopiesofmessagesinSentItemsfolder","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Messagehandling;L_Autosaveunsenteveryxxminutes0NoAutoSave","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Messagehandling;L_Automaticallycleanupplaintextmessages","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"You can use this setting to specify various options for how e-mail messages are handled.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Messagehandling;L_SavecopiesofmessagesinSentItemsfolder","uniqueId":3220,"displayName":"Save copies of messages in Sent Items folder","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"You can use this setting to specify various options for how e-mail messages are handled.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"savesent","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Messagesexpireafterdays","uniqueId":3272,"displayName":"Messages expire after (days)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Messagesexpireafterdays;L_Messagesexpireafterdays","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value for the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["When sending a message","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Messagesexpireafterdays;L_Messagesexpireafterdays","uniqueId":3271,"displayName":"Messages expire after (days)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":3652},"dataType":"Integer"},"description":"Sets the value for the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["When sending a message","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"numdaysexpire","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_MessagewhenOutlookcannotfindthedigitalIDtodecodeamessage;L_Entererrormessagetextmax255characters","uniqueId":3512,"displayName":"Enter error message text (max 255 characters):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Sets the value for the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"needencryptionstring","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_MessagewhenOutlookcannotfindthedigitalIDtodecodeamessage","uniqueId":3513,"displayName":"Message when Outlook cannot find the digital ID to decode a message","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_MessagewhenOutlookcannotfindthedigitalIDtodecodeamessage;L_Entererrormessagetextmax255characters","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value for the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_MinimizeOutlooktothesystemtray","uniqueId":3429,"displayName":"Minimize Outlook to the system tray","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the Outlook system tray icon option \"Hide When Minimized\".","supportedPlatforms":["Windows"],"tags":["Advanced","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"mintotray","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Minimumencryptionsettings","uniqueId":3506,"displayName":"Minimum encryption settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Minimumencryptionsettings;L_Minimumkeysizeinbits","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to set the minimum key length for an encrypted e-mail message.\n\nIf you enable this policy setting, you may set the minimum key length for an encrypted e-mail message.  Outlook will display a warning dialog if the user tries to send a message using an encryption key that is below the minimum encryption key value set. The user can still choose to ignore the warning and send using the encryption key originally chosen.\n\nIf you disable or do not configure this policy setting, a dialog warning will be shown to the user if the user attempts to send a message using encryption.  The user can still choose to ignore the warning and send using the encryption key originally chosen.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Minimumencryptionsettings;L_Minimumkeysizeinbits","uniqueId":3505,"displayName":"Minimum key size (in bits):","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"recommendedValues":[{"value":"168","recommendation":"security"}],"description":"This policy setting allows you to set the minimum key length for an encrypted e-mail message.\n\nIf you enable this policy setting, you may set the minimum key length for an encrypted e-mail message.  Outlook will display a warning dialog if the user tries to send a message using an encryption key that is below the minimum encryption key value set. The user can still choose to ignore the warning and send using the encryption key originally chosen.\n\nIf you disable or do not configure this policy setting, a dialog warning will be shown to the user if the user attempts to send a message using encryption.  The user can still choose to ignore the warning and send using the encryption key originally chosen.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"minenckey","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_MissingCRLs;L_IndicateamissingCRLasan","uniqueId":3537,"displayName":"Indicate a missing CRL as a(n):","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Warning","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Error","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls whether Outlook considers a missing certificate revocation list (CRL) a warning or an error. Digital certificates contain an attribute that shows where the corresponding CRL is located. CRLs contain lists of digital certificates that have been revoked by their controlling certification authorities (CAs), typically because the certificates were issued improperly or their associated private keys were compromised. If a CRL is missing or unavailable, Outlook cannot determine whether a certificate has been revoked. Therefore, an improperly issued certificate or one that has been compromised might be used to gain access to data. \n\nIf you enable this policy setting, you can choose between two options that determine how Outlook functions when a CRL is missing: \n\n- Warning. This option is the default configuration in Outlook and ensures that Outlook displays a warning message when a CRL is missing. \n\n- Error. This option ensures that Outlook displays an error message when a CRL is missing.  \n\nIf you disable or do not configure this policy setting, Outlook displays a warning message when a CRL is not available.","supportedPlatforms":["Windows"],"tags":["Signature Status dialog box","Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"sigstatusnocrl","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_MissingCRLs","uniqueId":3538,"displayName":"Missing CRLs","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_MissingCRLs;L_IndicateamissingCRLasan","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls whether Outlook considers a missing certificate revocation list (CRL) a warning or an error. Digital certificates contain an attribute that shows where the corresponding CRL is located. CRLs contain lists of digital certificates that have been revoked by their controlling certification authorities (CAs), typically because the certificates were issued improperly or their associated private keys were compromised. If a CRL is missing or unavailable, Outlook cannot determine whether a certificate has been revoked. Therefore, an improperly issued certificate or one that has been compromised might be used to gain access to data. \n\nIf you enable this policy setting, you can choose between two options that determine how Outlook functions when a CRL is missing: \n\n- Warning. This option is the default configuration in Outlook and ensures that Outlook displays a warning message when a CRL is missing. \n\n- Error. This option ensures that Outlook displays an error message when a CRL is missing.  \n\nIf you disable or do not configure this policy setting, Outlook displays a warning message when a CRL is not available.","supportedPlatforms":["Windows"],"tags":["Signature Status dialog box","Cryptography","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Missingrootcertificates;L_Indicateamissingrootcertificateasan","uniqueId":3539,"displayName":"Indicate a missing root certificate as a(n):","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Neither error nor warning","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Warning","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Error","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls how Outlook functions when a root certificate is missing. \n\nIf you enable this policy setting, you can choose from three options that determine how Outlook functions when a root certificate is missing. \n\n- Neither Error nor Warning. This option displays neither an error nor a warning, and enforces the default configuration in Outlook.\n- Warning. This option ensures that Outlook displays a warning message when a root certificate is missing. \n- Error. This option ensures that Outlook displays an error message when a root certificate is missing. \n\nIf you don't configure this policy setting, users will see an error when a root certificate is missing.","supportedPlatforms":["Windows"],"tags":["Signature Status dialog box","Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"sigstatusnotrustdecision","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Missingrootcertificates","uniqueId":3540,"displayName":"Missing root certificates","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Missingrootcertificates;L_Indicateamissingrootcertificateasan","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls how Outlook functions when a root certificate is missing. \n\nIf you enable this policy setting, you can choose from three options that determine how Outlook functions when a root certificate is missing. \n\n- Neither Error nor Warning. This option displays neither an error nor a warning, and enforces the default configuration in Outlook.\n- Warning. This option ensures that Outlook displays a warning message when a root certificate is missing. \n- Error. This option ensures that Outlook displays an error message when a root certificate is missing. \n\nIf you don't configure this policy setting, users will see an error when a root certificate is missing.","supportedPlatforms":["Windows"],"tags":["Signature Status dialog box","Cryptography","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Modifynumberofchangeditemsincluded;L_empty34","uniqueId":3638,"displayName":"Modify number of changed items included in SharePoint client page download","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":15,"maximum":1000},"dataType":"Integer"},"defaultValue":"250","description":"By default, the number of changes an Outlook client downloads from a SharePoint server in a single web service request or \"page\" is 250 changed items. If SharePoint servers have reduced capacity or are overwhelmed by the size of requests coming from Outlook clients, you can change this setting to specify a different number of items to download for a SharePoint page. \n\nYou should test changes in this setting to determine the impact in your specific environment. A page size below 15 or above 1000 is not recommended.","supportedPlatforms":["Windows"],"tags":["SharePoint Lists","Account Settings","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"sharepointpagesize","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Modifynumberofchangeditemsincluded","uniqueId":3639,"displayName":"Modify number of changed items included in SharePoint client page download","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Modifynumberofchangeditemsincluded;L_empty34","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"By default, the number of changes an Outlook client downloads from a SharePoint server in a single web service request or \"page\" is 250 changed items. If SharePoint servers have reduced capacity or are overwhelmed by the size of requests coming from Outlook clients, you can change this setting to specify a different number of items to download for a SharePoint page. \n\nYou should test changes in this setting to determine the impact in your specific environment. A page size below 15 or above 1000 is not recommended.","supportedPlatforms":["Windows"],"tags":["SharePoint Lists","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_MoreOptions","uniqueId":3430,"displayName":"Warn before permanently deleting items","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, a warning message is displayed before Outlook items are permanently deleted. By disabling this setting, you can change this behavior to not display the warning message.","supportedPlatforms":["Windows"],"tags":["Advanced","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"warndelete","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Moresavemessages;L_InfoldersotherthantheInboxsavereplieswithoriginalmessage","uniqueId":3251,"displayName":"In folders other than the Inbox, save replies with original message","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"savereplies","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Moresavemessages","uniqueId":3253,"displayName":"More save messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Moresavemessages;L_InfoldersotherthantheInboxsavereplieswithoriginalmessage","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Moresavemessages;L_Saveforwardedmessages","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Moresavemessages;L_Saveforwardedmessages","uniqueId":3252,"displayName":"Save forwarded messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"savefw","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_MSGUnicodeformatwhendraggingtofilesystem","uniqueId":3432,"displayName":"Use Unicode format when dragging e-mail message to file system","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting controls whether e-mail messages dragged from Outlook to the file system are saved in Unicode or ANSI format. \n\nIf you enable or do not configure this policy setting, when users drag an e-mail message from Outlook to the file system, Outlook uses the Unicode character encoding standard to create the message file, which preserves special characters in the message. \n\nIf you disable this policy setting, when users drag an e-mail message from Outlook to the file system, the message file created is in ANSI format.","supportedPlatforms":["Windows"],"tags":["Advanced","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"msgformat","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_NewMailDesktopAlert","uniqueId":3232,"displayName":"Do not display New Mail alert for users","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, users receive an alert message on their desktops when new mail arrives. By enabling this setting, the alert is not displayed for new mail.","supportedPlatforms":["Windows"],"tags":["Desktop Alert","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"newmaildesktopalerts","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_NewOutlookAutomaticSetupUserSetting","uniqueId":3867,"displayName":"Manage automatic setup of classic Outlook accounts in new Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy setting allows you to manage whether classic Outlook automatically sets up user accounts and settings in new Outlook.\n\nIf you enable this policy setting, automatic setup of user accounts and settings in new Outlook is allowed and cannot be changed by the user.\n\nIf you disable this policy setting, automatic setup of user accounts and settings in new Outlook is not allowed and cannot be changed by the user.\n\nIf you don't configure this policy setting, users can manage the setting themselves. Automatic setup is enabled by default.\n      ","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"newoutlookautomaticsetupusersetting","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_NewOutlookAutoMigrationRetryIntervals","uniqueId":3865,"displayName":"Interval between new Outlook migration attempts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_NewOutlookAutoMigrationRetryIntervals;L_NewOutlookAutoMigrationRetryIntervalsId","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls the interval between new Outlook migration attempts.\n\nIf you don't set this or set this to 0 (default value), classic Outlook will stop executing \"New Outlook auto migration\" after the user toggles back to classic Outlook for Windows.\n\nIf you set this to 1, classic Outlook will show a blocking prompt on each app launch, which will attempt to switch the user to the new Outlook app.\n\nIf you set this to N (2 - 9900) value, \"New Outlook auto migration\" will be re-initiated N days after the user toggles back to classic Outlook.\n\nNote: This policy only applies to subscription-based Microsoft 365 Apps.\n      ","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_NewOutlookAutoMigrationRetryIntervals;L_NewOutlookAutoMigrationRetryIntervalsId","uniqueId":3864,"displayName":"New Outlook Auto Migration Retry Interval:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":9900},"dataType":"Integer"},"defaultValue":"0","description":"This policy setting controls the interval between new Outlook migration attempts.\n\nIf you don't set this or set this to 0 (default value), classic Outlook will stop executing \"New Outlook auto migration\" after the user toggles back to classic Outlook for Windows.\n\nIf you set this to 1, classic Outlook will show a blocking prompt on each app launch, which will attempt to switch the user to the new Outlook app.\n\nIf you set this to N (2 - 9900) value, \"New Outlook auto migration\" will be re-initiated N days after the user toggles back to classic Outlook.\n\nNote: This policy only applies to subscription-based Microsoft 365 Apps.\n      ","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"newoutlookautomigrationretryintervals","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_NewOutlookMigrationUserSetting","uniqueId":3866,"displayName":"Manage user setting for new Outlook automatic migration","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy allows you to manage the user setting for enabling or disabling automatic migration to the new Outlook app, initiated by Microsoft.\n\nIf you don't configure this policy (default), the user setting for automatic migration is not controlled by the policy, allowing the user to manage it themselves. This user setting for automatic migration is enabled by default.\n\nIf you enable this policy, the user setting controlling automatic migration is enabled. Automatic migration to the new Outlook app is allowed, and the user cannot change this setting.\n\nIf you disable this policy, the user setting controlling automatic migration is disabled. Automatic migration to the new Outlook app is not allowed, and the user cannot change this setting.\n\nNote that this user setting is not available for migration initiated via the 'Admin-Controlled Migration to New Outlook' policy.\n      ","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"newoutlookmigrationusersetting","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_NoPromptLevel1Close","uniqueId":3460,"displayName":"Do not prompt about Level 1 attachments when closing an item","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook displays a warning before closing an item that contains an unsafe attachment that will be blocked when the item is re-opened.To protect users from viruses and other harmful files, Outlook uses two levels of security, designated Level 1 and Level 2, to restrict users' access to files attached to e-mail messages or other items. Outlook completely blocks access to Level 1 files by default, and requires users to save Level 2 files to disk before opening them. Potentially harmful files can be classified into these two levels by file type extension, with all other file types considered safe. \n\nIf you enable this policy setting, Outlook will not display a warning when users close items with Level 1 attachments, which could cause data loss. \n\nIf you disable or do not configure this policy setting, when a user closes an item to which a level 1 file has been attached, Outlook warns the user that the message contains a potentially unsafe attachment and that the user might not be able to access the attachment when opening the item later. (Such a sequence of events might occur when a user closes a draft message that they intend to resume editing at some future time.) \n\nImportant: This policy setting only applies if the \"Outlook Security Mode\" policy setting under \"Microsoft Outlook 2016\\Security\\Security Form Settings\" is configured to \"Use Outlook Security Group Policy.\"","supportedPlatforms":["Windows"],"tags":["Attachment Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"dontpromptlevel1attachclose","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_NoPromptLevel1Send","uniqueId":3459,"displayName":"Do not prompt about Level 1 attachments when sending an item","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook displays a warning before sending an item that contains an unsafe attachment that will be blocked when the item is opened by a recipient. To protect users from viruses and other harmful files, Outlook uses two levels of security, designated Level 1 and Level 2, to restrict access to files attached to e-mail messages or other items. Outlook completely blocks access to Level 1 files by default, and requires users to save Level 2 files to disk before opening them. Potentially harmful files can be classified into these two levels by file type extension, with all other file types considered safe. \n\nIf you enable this policy setting, Outlook will not display a warning when a user sends an item with a Level 1 attachment, which can cause users' data to be at risk.\n\nIf you disable or do not configure this policy setting, when users attempt to send an item to which a level 1 file has been attached, Outlook warns them that the message contains a potentially unsafe attachment and that the recipient might not be able to access it. \n\nImportant: This policy setting only applies if the \"Outlook Security Mode\" policy setting under \"Microsoft Outlook 2016\\Security\\Security Form Settings\" is configured to \"Use Outlook Security Group Policy.\"","supportedPlatforms":["Windows"],"tags":["Attachment Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"dontpromptlevel1attachsend","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_NotesFolderHomePage","uniqueId":3690,"displayName":"Notes Folder Home Page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_NotesFolderHomePage;L_showassociatedwebpage57","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_NotesFolderHomePage;L_urladdressofassociatedwebpage58","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_NotesFolderHomePage;L_turnoffinternetexplorersecuritychecksforthiswebpage59","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Notes Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_NotesFolderHomePage;L_showassociatedwebpage57","uniqueId":3687,"displayName":"Show associated web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Notes Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\notes","registrySubPath":"show","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_NotesFolderHomePage;L_turnoffinternetexplorersecuritychecksforthiswebpage59","uniqueId":3689,"displayName":"Turn off Windows Internet Explorer security checks for this web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Notes Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\notes","registrySubPath":"security","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_NotesFolderHomePage;L_urladdressofassociatedwebpage58","uniqueId":3688,"displayName":"URL address of associated web page:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Notes Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\notes","registrySubPath":"url","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_OfflineAddressBookexactaliasmatching","uniqueId":3593,"displayName":"Return e-mail alias if it exactly matches the provided e-mail address when searching OAB","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, when searching the Offline Address Book, Outlook resolves e-mail addresses using Ambiguous Name Resolution. With Ambiguous Name Resolution, Outlook suggests additional possible matches (if they exist) even if there is a name that matches exactly the e-mail alias entered. By enabling this setting, you can change the behavior so that Outlook returns a single e-mail address if it exactly matches an e-mail alias.","supportedPlatforms":["Windows"],"tags":["Offline Address Book","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\exchange\\exchange provider","registrySubPath":"oab exact alias match","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OfflineAddressBookLimitmanualOABdownloads;L_AllowxxmanualOABdownloadsper13hrperiod","uniqueId":3590,"displayName":"Upper limit of number of manual OAB downloads per 13 hour period","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":65535},"dataType":"Integer"},"defaultValue":"65535","description":"This policy setting allows you to specify the number of manual downloads of the offline address book (OAB) allowed in a 13 hour period.\n\nIf you enable this policy setting, you may specify the number of manual downloads of the offline address book (OAB) allowed in a 13 hour period.  If you set the value to 0, then no manual OAB downloads are allowed.  If you set the value to the maximum of 65535, then that will allow an unlimited number of manual downloads of the OAB.\n\nIf you disable or do not configure this policy setting, an unlimited number of  manual downloads of the OAB will be allowed.","supportedPlatforms":["Windows"],"tags":["Offline Address Book","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\exchange\\exchange provider","registrySubPath":"limit manual oab download","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OfflineAddressBookLimitmanualOABdownloads","uniqueId":3591,"displayName":"Offline Address Book: Limit manual OAB downloads","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_OfflineAddressBookLimitmanualOABdownloads;L_AllowxxmanualOABdownloadsper13hrperiod","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the number of manual downloads of the offline address book (OAB) allowed in a 13 hour period.\n\nIf you enable this policy setting, you may specify the number of manual downloads of the offline address book (OAB) allowed in a 13 hour period.  If you set the value to 0, then no manual OAB downloads are allowed.  If you set the value to the maximum of 65535, then that will allow an unlimited number of manual downloads of the OAB.\n\nIf you disable or do not configure this policy setting, an unlimited number of  manual downloads of the OAB will be allowed.","supportedPlatforms":["Windows"],"tags":["Offline Address Book","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_OfflineAddressBookLimitnumberofincrementalOABdownloads;L_AllowxxincrementalOABdownloadsper13hrperiod","uniqueId":3588,"displayName":"Allow xx incremental OAB downloads per 13hr period","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":65535},"dataType":"Integer"},"description":"This policy setting allows you to specify the number of incremental download attempts of the offline address book (OAB) allowed in a 13 hour period.\n\nIf you enable this policy setting, you may specify the number of incremental download attempts of the offline address book (OAB) allowed in a 13 hour period.  If you set the value to 0, then no incremental download attempts are allowed.  If you set the value to the maximum of 65535, then that will allow an unlimited number of incremental OAB download attempts.\n\nIf you disable or do not configure this policy setting, an unlimited number of incremental OAB download attempts of the OAB will be allowed.","supportedPlatforms":["Windows"],"tags":["Offline Address Book","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\exchange\\exchange provider","registrySubPath":"limit srs incremental download","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OfflineAddressBookLimitnumberofincrementalOABdownloads","uniqueId":3589,"displayName":"Offline Address Book: Limit number of incremental OAB downloads","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_OfflineAddressBookLimitnumberofincrementalOABdownloads;L_AllowxxincrementalOABdownloadsper13hrperiod","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the number of incremental download attempts of the offline address book (OAB) allowed in a 13 hour period.\n\nIf you enable this policy setting, you may specify the number of incremental download attempts of the offline address book (OAB) allowed in a 13 hour period.  If you set the value to 0, then no incremental download attempts are allowed.  If you set the value to the maximum of 65535, then that will allow an unlimited number of incremental OAB download attempts.\n\nIf you disable or do not configure this policy setting, an unlimited number of incremental OAB download attempts of the OAB will be allowed.","supportedPlatforms":["Windows"],"tags":["Offline Address Book","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_OfflineAddressBookPromptbeforeDownloadingFullOAB","uniqueId":3592,"displayName":"Offline Address Book: Prompt before Downloading Full OAB","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Specifies that the user is asked for permission before initiating a full download of the offline address book.","supportedPlatforms":["Windows"],"tags":["Offline Address Book","Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\exchange\\exchange provider","registrySubPath":"allow full oab prompt","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OnExecuteCustomActionOOM","uniqueId":3472,"displayName":"Set Outlook object model custom actions execution prompt","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_OnExecuteCustomActionOOM;L_OnExecuteCustomActionOOM_Setting","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls whether Outlook prompts users before executing a custom action. Custom actions add functionality to Outlook that can be triggered as part of a rule. Among other possible features, custom actions can be created that reply to messages in ways that circumvent the Outlook model's programmatic send protections. \n\nIf you enable this policy setting, you can choose from four options to control how Outlook functions when a custom action is executed that uses the Outlook object model: \n\n* Prompt User \n* Automatically Approve \n* Automatically Deny \n* Prompt user based on computer security. This option enforces the default configuration in Outlook. \n\nIf you disable or do not configure this policy setting, when Outlook or another program initiates a custom action using the Outlook object model, users are prompted to allow or reject the action. If this configuration is changed, malicious code can use the Outlook object model to compromise sensitive information or otherwise cause data and computing resources to be at risk. This is the equivalent of choosing Enabled -- Prompt user based on computer security.","supportedPlatforms":["Windows"],"tags":["Custom Form Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_OnExecuteCustomActionOOM;L_OnExecuteCustomActionOOM_Setting","uniqueId":3471,"displayName":"When executing a custom action:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt User","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically Approve","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically Deny","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt user based on computer security","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":1,"description":"This policy setting controls whether Outlook prompts users before executing a custom action. Custom actions add functionality to Outlook that can be triggered as part of a rule. Among other possible features, custom actions can be created that reply to messages in ways that circumvent the Outlook model's programmatic send protections. \n\nIf you enable this policy setting, you can choose from four options to control how Outlook functions when a custom action is executed that uses the Outlook object model: \n\n* Prompt User \n* Automatically Approve \n* Automatically Deny \n* Prompt user based on computer security. This option enforces the default configuration in Outlook. \n\nIf you disable or do not configure this policy setting, when Outlook or another program initiates a custom action using the Outlook object model, users are prompted to allow or reject the action. If this configuration is changed, malicious code can use the Outlook object model to compromise sensitive information or otherwise cause data and computing resources to be at risk. This is the equivalent of choosing Enabled -- Prompt user based on computer security.","supportedPlatforms":["Windows"],"tags":["Custom Form Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"promptoomcustomaction","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Onrepliesandforwards;L_Allowuserscommentstobemarked","uniqueId":3294,"displayName":"Allow user's comments to be marked","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the values in the corresponding UI options.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\mailsettings","registrySubPath":"markcomments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Onrepliesandforwards","uniqueId":3295,"displayName":"On replies and forwards","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Onrepliesandforwards;L_Whenreplyingtoamessage","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Onrepliesandforwards;L_Whenforwardingamessage","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Onrepliesandforwards;L_Prefixeachlinewith","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Onrepliesandforwards;L_Allowuserscommentstobemarked","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the values in the corresponding UI options.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Onrepliesandforwards;L_Prefixeachlinewith","uniqueId":3293,"displayName":"Prefix each line with:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Sets the values in the corresponding UI options.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"prefixtext","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_Onrepliesandforwards;L_Whenforwardingamessage","uniqueId":3292,"displayName":"When forwarding a message:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Attach orginal message","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Include original message text","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Include and indent org. message text","description":"","tags":[],"dependencyGroup":null},{"value":1000,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prefix each line of the org. message","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Sets the values in the corresponding UI options.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"forwardstyle","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Onrepliesandforwards;L_Whenreplyingtoamessage","uniqueId":3291,"displayName":"When replying to a message:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not include orginal message","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Attach orginal message","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Include original message text","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Include and indent org. message text","description":"","tags":[],"dependencyGroup":null},{"value":1000,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prefix each line of the org. message","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the values in the corresponding UI options.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"replystyle","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OnSendAddinsEnabled","uniqueId":3830,"displayName":"Block send when web add-ins can't load","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether Outlook should block sending emails and meeting requests until web add-ins are loaded from Exchange.\n\nIf you enable this policy setting, Outlook won’t allow emails and meeting requests to be sent until web add-ins are loaded from Exchange.\n\nIf you disable or don’t configure this policy setting, Outlook will allow emails and meeting requests to be sent even if the latest web add-ins haven’t been loaded from Exchange yet.\n\nFor more information about when to use this setting, see https://go.microsoft.com/fwlink/p/?linkid=2161562","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"onsendaddinswaitforload","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OOMAddressAccess","uniqueId":3478,"displayName":"Configure Outlook object model prompt when reading address information","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_OOMAddressAccess;L_OOMAddressAccess_Setting","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls what happens when an untrusted program attempts to gain access to a recipient field, such as the ''To:'' field, using the Outlook object model. This includes COM add-ins, from 3rd parties and Microsoft, one example is Azure Information Protection which can access the Address Book programmatically.\n\n        If you enable this policy setting,  you can choose from four different options when an untrusted program attempts to access a recipient field using the Outlook object model:\n\n        - Prompt user. The user will be prompted to approve every access attempt.\n        - Automatically approve. Outlook will automatically grant programmatic access requests from any program. This option can create a significant vulnerability, and is not recommended.\n        - Automatically deny. Outlook will automatically deny programmatic access requests from any program.\n        - Prompt user based on computer security. Outlook will only prompt users when antivirus software is out of date or not running. This is the default configuration.\n\n        If you disable or do not configure this policy setting, when an untrusted application attempts to access recipient fields, Outlook relies on the setting configured in the ''Programmatic Access'' section of the Trust Center.","supportedPlatforms":["Windows"],"tags":["Programmatic Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_OOMAddressAccess;L_OOMAddressAccess_Setting","uniqueId":3477,"displayName":"Guard behavior:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt User","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically Approve","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically Deny","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt user based on computer security","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":1,"description":"This policy setting controls what happens when an untrusted program attempts to gain access to a recipient field, such as the ''To:'' field, using the Outlook object model. This includes COM add-ins, from 3rd parties and Microsoft, one example is Azure Information Protection which can access the Address Book programmatically.\n\n        If you enable this policy setting,  you can choose from four different options when an untrusted program attempts to access a recipient field using the Outlook object model:\n\n        - Prompt user. The user will be prompted to approve every access attempt.\n        - Automatically approve. Outlook will automatically grant programmatic access requests from any program. This option can create a significant vulnerability, and is not recommended.\n        - Automatically deny. Outlook will automatically deny programmatic access requests from any program.\n        - Prompt user based on computer security. Outlook will only prompt users when antivirus software is out of date or not running. This is the default configuration.\n\n        If you disable or do not configure this policy setting, when an untrusted application attempts to access recipient fields, Outlook relies on the setting configured in the ''Programmatic Access'' section of the Trust Center.","supportedPlatforms":["Windows"],"tags":["Programmatic Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"promptoomaddressinformationaccess","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OOMAddressBook","uniqueId":3476,"displayName":"Configure Outlook object model prompt when accessing an address book","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_OOMAddressBook;L_OOMAddressBook_Setting","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls what happens when an untrusted program attempts to gain access to an Address Book using the Outlook object model. This includes COM add-ins, from 3rd parties and Microsoft, one example is Azure Information Protection which can access the Address Book programmatically.\n\n        If you enable this policy setting, you can choose from four different options when an untrusted program attempts to programmatically access an Address Book using the Outlook object model:\n\n        - Prompt user - Users are prompted to approve every access attempt.\n        - Automatically approve - Outlook will automatically grant programmatic access requests from any program. This option can create a significant vulnerability, and is not recommended.\n        - Automatically deny - Outlook will automatically deny programmatic access requests from any program.\n        - Prompt user based on computer security - Outlook will rely on the setting in the ''Programmatic Access'' section of the Trust Center. This is the default behavior.\n\n        If you disable or do not configure this policy setting, when an untrusted application attempts to access the address book programmatically, Outlook relies on the setting configured in the ''Programmatic Access'' section of the Trust Center.\n      ","supportedPlatforms":["Windows"],"tags":["Programmatic Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_OOMAddressBook;L_OOMAddressBook_Setting","uniqueId":3475,"displayName":"Guard behavior:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt User","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically Approve","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically Deny","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt user based on computer security","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":1,"description":"This policy setting controls what happens when an untrusted program attempts to gain access to an Address Book using the Outlook object model. This includes COM add-ins, from 3rd parties and Microsoft, one example is Azure Information Protection which can access the Address Book programmatically.\n\n        If you enable this policy setting, you can choose from four different options when an untrusted program attempts to programmatically access an Address Book using the Outlook object model:\n\n        - Prompt user - Users are prompted to approve every access attempt.\n        - Automatically approve - Outlook will automatically grant programmatic access requests from any program. This option can create a significant vulnerability, and is not recommended.\n        - Automatically deny - Outlook will automatically deny programmatic access requests from any program.\n        - Prompt user based on computer security - Outlook will rely on the setting in the ''Programmatic Access'' section of the Trust Center. This is the default behavior.\n\n        If you disable or do not configure this policy setting, when an untrusted application attempts to access the address book programmatically, Outlook relies on the setting configured in the ''Programmatic Access'' section of the Trust Center.\n      ","supportedPlatforms":["Windows"],"tags":["Programmatic Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"promptoomaddressbookaccess","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OOMFormula","uniqueId":3484,"displayName":"Configure Outlook object model prompt When accessing the Formula property of a UserProperty object","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_OOMFormula;L_OOMFormula_Setting","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls what happens when a user designs a custom form in Outlook and attempts to bind an Address Information field to a combination or formula custom field.\n\nIf you enable this policy setting, you can choose from four different options when an untrusted program attempts to access address information using the UserProperties. Find method of the Outlook object model: \n\n- Prompt user. The user will be prompted to approve every access attempt. \n- Automatically approve. Outlook will automatically grant programmatic access requests from any program. This option can create a significant vulnerability, and is not recommended. \n- Automatically deny. Outlook will automatically deny programmatic access requests from any program. \n- Prompt user based on computer security. Outlook will only prompt users when antivirus software is out of date or not running. \n\nIf you disable or do not configure this policy setting, when a user tries to bind an address information field to a combination or formula custom field in a custom form, Outlook relies on the setting configured in the ''Programmatic Access'' section of the Trust Center. ","supportedPlatforms":["Windows"],"tags":["Programmatic Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_OOMFormula;L_OOMFormula_Setting","uniqueId":3483,"displayName":"Guard behavior:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt User","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically Approve","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically Deny","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt user based on computer security","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":1,"description":"This policy setting controls what happens when a user designs a custom form in Outlook and attempts to bind an Address Information field to a combination or formula custom field.\n\nIf you enable this policy setting, you can choose from four different options when an untrusted program attempts to access address information using the UserProperties. Find method of the Outlook object model: \n\n- Prompt user. The user will be prompted to approve every access attempt. \n- Automatically approve. Outlook will automatically grant programmatic access requests from any program. This option can create a significant vulnerability, and is not recommended. \n- Automatically deny. Outlook will automatically deny programmatic access requests from any program. \n- Prompt user based on computer security. Outlook will only prompt users when antivirus software is out of date or not running. \n\nIf you disable or do not configure this policy setting, when a user tries to bind an address information field to a combination or formula custom field in a custom form, Outlook relies on the setting configured in the ''Programmatic Access'' section of the Trust Center. ","supportedPlatforms":["Windows"],"tags":["Programmatic Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"promptoomformulaaccess","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OOMMeetingTaskRequest","uniqueId":3480,"displayName":"Configure Outlook object model prompt when responding to meeting and task requests","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_OOMMeetingTaskRequest;L_OOMMeetingTaskRequest_Setting","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls what happens when an untrusted program attempts to programmatically send e-mail in Outlook using the Response method of a task or meeting request. \n\nIf you enable this policy setting, you can choose from four different options when an untrusted program attempts to programmatically send e-mail using the Response method of a task or meeting request:\n\n- Prompt user. The user will be prompted to approve every access attempt.\n- Automatically approve. Outlook will automatically grant programmatic access requests from any program. This option can create a significant vulnerability, and is not recommended.\n- Automatically deny. Outlook will automatically deny programmatic access requests from any program. \n- Prompt user based on computer security. Outlook only prompts users when antivirus software is out of date or not running. This is the default configuration. \n\nIf you disable or do not configure this policy setting, when an untrusted application attempts to respond to tasks or meeting requests programmatically, Outlook relies on the setting configured in the ''Programmatic Access'' section of the Trust Center. ","supportedPlatforms":["Windows"],"tags":["Programmatic Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_OOMMeetingTaskRequest;L_OOMMeetingTaskRequest_Setting","uniqueId":3479,"displayName":"Guard behavior:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt User","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically Approve","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically Deny","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt user based on computer security","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":1,"description":"This policy setting controls what happens when an untrusted program attempts to programmatically send e-mail in Outlook using the Response method of a task or meeting request. \n\nIf you enable this policy setting, you can choose from four different options when an untrusted program attempts to programmatically send e-mail using the Response method of a task or meeting request:\n\n- Prompt user. The user will be prompted to approve every access attempt.\n- Automatically approve. Outlook will automatically grant programmatic access requests from any program. This option can create a significant vulnerability, and is not recommended.\n- Automatically deny. Outlook will automatically deny programmatic access requests from any program. \n- Prompt user based on computer security. Outlook only prompts users when antivirus software is out of date or not running. This is the default configuration. \n\nIf you disable or do not configure this policy setting, when an untrusted application attempts to respond to tasks or meeting requests programmatically, Outlook relies on the setting configured in the ''Programmatic Access'' section of the Trust Center. ","supportedPlatforms":["Windows"],"tags":["Programmatic Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"promptoommeetingtaskrequestresponse","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OOMSaveAs","uniqueId":3482,"displayName":"Configure Outlook object model prompt when executing Save As","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_OOMSaveAs;L_OOMSaveAs_Setting","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls what happens when an untrusted program attempts to use the Save As command to programmatically save an item. \n\nIf you enable this policy setting, you can choose from four different options when an untrusted program attempts to use the Save As command to programmatically save an item:\n\n- Prompt user. The user will be prompted to approve every access attempt. \n- Automatically approve. Outlook will automatically grant programmatic access requests from any program. This option can create a significant vulnerability, and is not recommended. \n- Automatically deny. Outlook will automatically deny programmatic access requests from any program.\n- Prompt user based on computer security. Outlook will only prompt users when antivirus software is out of date or not running. This is the default configuration.\n\nIf you disable or do not configure this policy setting, when an untrusted application attempts to use the Save As command, Outlook relies on the setting configured in the ''Programmatic Access'' section of the Trust Center.","supportedPlatforms":["Windows"],"tags":["Programmatic Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_OOMSaveAs;L_OOMSaveAs_Setting","uniqueId":3481,"displayName":"Guard behavior:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt User","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically Approve","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically Deny","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt user based on computer security","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":1,"description":"This policy setting controls what happens when an untrusted program attempts to use the Save As command to programmatically save an item. \n\nIf you enable this policy setting, you can choose from four different options when an untrusted program attempts to use the Save As command to programmatically save an item:\n\n- Prompt user. The user will be prompted to approve every access attempt. \n- Automatically approve. Outlook will automatically grant programmatic access requests from any program. This option can create a significant vulnerability, and is not recommended. \n- Automatically deny. Outlook will automatically deny programmatic access requests from any program.\n- Prompt user based on computer security. Outlook will only prompt users when antivirus software is out of date or not running. This is the default configuration.\n\nIf you disable or do not configure this policy setting, when an untrusted application attempts to use the Save As command, Outlook relies on the setting configured in the ''Programmatic Access'' section of the Trust Center.","supportedPlatforms":["Windows"],"tags":["Programmatic Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"promptoomsaveas","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OOMSend","uniqueId":3474,"displayName":"Configure Outlook object model prompt when sending mail","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_OOMSend;L_OOMSend_Setting","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls what happens when an untrusted program attempts to send e-mail programmatically using the Outlook object model. \n\nIf you enable this policy setting, you can choose from four different options when an untrusted program attempts to send e-mail programmatically using the Outlook object model: \n\n- Prompt user - The user will be prompted to approve every access attempt.\n- Automatically approve - Outlook will automatically grant programmatic access requests from any program. This option can create a significant vulnerability, and is not recommended. \n- Automatically deny - Outlook will automatically deny programmatic access requests from any program. \n- Prompt user based on computer security. Outlook will only prompt users when antivirus software is out of date or not running. \n\nImportant: This policy setting only applies if the ''Outlook Security Mode'' policy setting under ''Microsoft Outlook 2016\\Security\\Security Form Settings'' is configured to ''Use Outlook Security Group Policy.''\n\nIf you disable or do not configure this policy setting, when an untrusted application attempts to send mail programmatically, Outlook relies on the setting configured in the ''Programmatic Access'' section of the Trust Center. ","supportedPlatforms":["Windows"],"tags":["Programmatic Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_OOMSend;L_OOMSend_Setting","uniqueId":3473,"displayName":"Guard behavior:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt User","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically Approve","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically Deny","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt user based on computer security","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":1,"description":"This policy setting controls what happens when an untrusted program attempts to send e-mail programmatically using the Outlook object model. \n\nIf you enable this policy setting, you can choose from four different options when an untrusted program attempts to send e-mail programmatically using the Outlook object model: \n\n- Prompt user - The user will be prompted to approve every access attempt.\n- Automatically approve - Outlook will automatically grant programmatic access requests from any program. This option can create a significant vulnerability, and is not recommended. \n- Automatically deny - Outlook will automatically deny programmatic access requests from any program. \n- Prompt user based on computer security. Outlook will only prompt users when antivirus software is out of date or not running. \n\nImportant: This policy setting only applies if the ''Outlook Security Mode'' policy setting under ''Microsoft Outlook 2016\\Security\\Security Form Settings'' is configured to ''Use Outlook Security Group Policy.''\n\nIf you disable or do not configure this policy setting, when an untrusted application attempts to send mail programmatically, Outlook relies on the setting configured in the ''Programmatic Access'' section of the Trust Center. ","supportedPlatforms":["Windows"],"tags":["Programmatic Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"promptoomsend","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_options9;L_FreeBusyupdatedontheservereveryxxxseconds","uniqueId":3351,"displayName":"Free/Busy updated on the server every xxx seconds:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":86400},"dataType":"Integer"},"description":"Sets the value in the option \"Publish [] month(s) of Calendar free/busy information on the server\".","supportedPlatforms":["Windows"],"tags":["Free/Busy Options","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"fbupdatesecs","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_options9;L_MonthsofFreeBusyinformationpublished","uniqueId":3349,"displayName":"Months of Free/Busy information published:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":12},"dataType":"Integer"},"description":"Sets the value in the option \"Publish [] month(s) of Calendar free/busy information on the server\".","supportedPlatforms":["Windows"],"tags":["Free/Busy Options","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"fbpublishrange","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_options9","uniqueId":3352,"displayName":"Free/Busy options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_options9;L_MonthsofFreeBusyinformationpublished","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_options9;L_PreventusersfromchangingMonthsofFreeBusyinformation1","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_options9;L_FreeBusyupdatedontheservereveryxxxseconds","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value in the option \"Publish [] month(s) of Calendar free/busy information on the server\".","supportedPlatforms":["Windows"],"tags":["Free/Busy Options","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_options9;L_PreventusersfromchangingMonthsofFreeBusyinformation1","uniqueId":3350,"displayName":"Prevent users from changing Months of Free/Busy information being published","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the value in the option \"Publish [] month(s) of Calendar free/busy information on the server\".","supportedPlatforms":["Windows"],"tags":["Free/Busy Options","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar\\internet free/busy","registrySubPath":"lock fb range","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Options;L_Deleteblankvotingandmeetingresponsesafterprocessing","uniqueId":3286,"displayName":"Delete blank voting and meeting responses after processing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"You can use these settings to specify how tracking options work for Outlook e-mail messages.","supportedPlatforms":["Windows"],"tags":["Tracking Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"autodelrcpts","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Options","uniqueId":3290,"displayName":"Tracking options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Options;L_Processrequestsandresponsesonarrival","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Options;L_Processreceiptsonarrival","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Options;L_Deleteblankvotingandmeetingresponsesafterprocessing","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Options;L_Requestareadreceiptforallmessagesausersends","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Options;L_RequestdeliveryrcptforallmsgsausersendsExchangeonly","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Options;L_WhenOutlookisaskedtorespondtoareadreceiptrequest","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"You can use these settings to specify how tracking options work for Outlook e-mail messages.","supportedPlatforms":["Windows"],"tags":["Tracking Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Options;L_Processreceiptsonarrival","uniqueId":3285,"displayName":"Process receipts on arrival","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"You can use these settings to specify how tracking options work for Outlook e-mail messages.","supportedPlatforms":["Windows"],"tags":["Tracking Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"autoprocrcpts","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Options;L_Processrequestsandresponsesonarrival","uniqueId":3284,"displayName":"Process requests and responses on arrival","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"You can use these settings to specify how tracking options work for Outlook e-mail messages.","supportedPlatforms":["Windows"],"tags":["Tracking Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"autoprocreq","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Options;L_Requestareadreceiptforallmessagesausersends","uniqueId":3287,"displayName":"Request a read receipt for all messages a user sends","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"You can use these settings to specify how tracking options work for Outlook e-mail messages.","supportedPlatforms":["Windows"],"tags":["Tracking Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"readreceipt","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Options;L_RequestdeliveryrcptforallmsgsausersendsExchangeonly","uniqueId":3288,"displayName":"Request delivery rcpt for all msgs a user sends (Exchange only)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"You can use these settings to specify how tracking options work for Outlook e-mail messages.","supportedPlatforms":["Windows"],"tags":["Tracking Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"deliveryreceipt","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Options;L_WhenOutlookisaskedtorespondtoareadreceiptrequest","uniqueId":3289,"displayName":"When Outlook is asked to respond to a read receipt request:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Always send a response","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Never send a response","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Ask before sending a response","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"You can use these settings to specify how tracking options work for Outlook e-mail messages.","supportedPlatforms":["Windows"],"tags":["Tracking Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"receipt response","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OSTCreation","uniqueId":3606,"displayName":"Do not allow an OST file to be created","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Prevents offline folder use at startup. This is equivalent to clicking the Disable Offline Use button in the Offline Folder Settings dialog box.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\ost","registrySubPath":"noost","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OutboxFolderHomePage","uniqueId":3694,"displayName":"Outbox Folder Home Page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_OutboxFolderHomePage;L_showassociatedwebpage60","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_OutboxFolderHomePage;L_urladdressofassociatedwebpage61","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_OutboxFolderHomePage;L_turnoffinternetexplorersecuritychecksforthiswebpage62","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Outbox Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_OutboxFolderHomePage;L_showassociatedwebpage60","uniqueId":3691,"displayName":"Show associated web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Outbox Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\outbox","registrySubPath":"show","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_OutboxFolderHomePage;L_turnoffinternetexplorersecuritychecksforthiswebpage62","uniqueId":3693,"displayName":"Turn off Windows Internet Explorer security checks for this web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Outbox Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\outbox","registrySubPath":"security","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_OutboxFolderHomePage;L_urladdressofassociatedwebpage61","uniqueId":3692,"displayName":"URL address of associated web page:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Outbox Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\outbox","registrySubPath":"url","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_OutlookActivationAlertThreshold","uniqueId":3809,"displayName":"Specify activation disabling threshold for web extensions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_OutlookActivationAlertThreshold;L_OutlookActivationAlertThresholdSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the threshold that Outlook refers to before disabling a web extension during activation. \n\nIf you enable this policy setting, you can specify a threshold (in milliseconds) for the activation manager retry limit during an Outlook session. If the web extension requires more than the specified threshold for the number of occurrences specified by the activation manager retry limit during an Outlook session, Outlook disables the web extension. \n\nIf you disable or do not configure this policy setting, Outlook uses the default activation alert threshold of 1000 milliseconds. The maximum activation alert threshold is 10000 milliseconds, and the minimum activation alert threshold is 100 milliseconds.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_OutlookActivationAlertThreshold;L_OutlookActivationAlertThresholdSpinID","uniqueId":3808,"displayName":"(100 - 10000 milliseconds)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":100,"maximum":10000},"dataType":"Integer"},"defaultValue":"1000","description":"This policy setting allows you to specify the threshold that Outlook refers to before disabling a web extension during activation. \n\nIf you enable this policy setting, you can specify a threshold (in milliseconds) for the activation manager retry limit during an Outlook session. If the web extension requires more than the specified threshold for the number of occurrences specified by the activation manager retry limit during an Outlook session, Outlook disables the web extension. \n\nIf you disable or do not configure this policy setting, Outlook uses the default activation alert threshold of 1000 milliseconds. The maximum activation alert threshold is 10000 milliseconds, and the minimum activation alert threshold is 100 milliseconds.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\outlook","registrySubPath":"activationalertthreshold","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OutlookActivationManagerRetryLimit","uniqueId":3811,"displayName":"Specify activation manager retry limit for web extensions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_OutlookActivationManagerRetryLimit;L_OutlookActivationManagerRetryLimitSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the retry limit Outlook uses before disabling a web extension during activation.\n\nIf you enable this policy setting, you can specify the activation manager retry limit. If the web extension requires more than the specified activation alert threshold for the number of occurrences specified by the activation manager retry limit during an Outlook session, Outlook automatically disables the web extension. \n\nIf you disable or do not configure this policy setting, Outlook uses the default activation manager retry limit of 3 occurrences. The maximum activation manager retry limit is 5 occurrences, and the minimum activation manager retry limit is 1 occurrence.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_OutlookActivationManagerRetryLimit;L_OutlookActivationManagerRetryLimitSpinID","uniqueId":3810,"displayName":"(1 - 5 occurrences)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":5},"dataType":"Integer"},"defaultValue":"3","description":"This policy setting allows you to specify the retry limit Outlook uses before disabling a web extension during activation.\n\nIf you enable this policy setting, you can specify the activation manager retry limit. If the web extension requires more than the specified activation alert threshold for the number of occurrences specified by the activation manager retry limit during an Outlook session, Outlook automatically disables the web extension. \n\nIf you disable or do not configure this policy setting, Outlook uses the default activation manager retry limit of 3 occurrences. The maximum activation manager retry limit is 5 occurrences, and the minimum activation manager retry limit is 1 occurrence.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\outlook","registrySubPath":"activationretrylimit","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OutlookAlertInterval","uniqueId":3813,"displayName":"Specify alert interval for web extensions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_OutlookAlertInterval;L_OutlookAlertIntervalSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the alert interval Outlook uses before disabling a web extension during initialization. The alert interval controls how often Office checks on memory and CPU usage for a running web extension. \n\nIf you enable this policy setting, you can specify the alert interval for web extensions. If the web extension requires more than the specified memory alert threshold when the memory or CPU check occurs, Outlook disables the web extension. \n\nIf you disable or do not configure this policy setting, Outlook uses the default alert interval of 5 seconds. This alert interval overrides the WEF alert interval. The maximum alert interval is 600 seconds, and the minimum alert interval is 5 seconds.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_OutlookAlertInterval;L_OutlookAlertIntervalSpinID","uniqueId":3812,"displayName":"(5 - 600 seconds)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":5,"maximum":600},"dataType":"Integer"},"defaultValue":"5","description":"This policy setting allows you to specify the alert interval Outlook uses before disabling a web extension during initialization. The alert interval controls how often Office checks on memory and CPU usage for a running web extension. \n\nIf you enable this policy setting, you can specify the alert interval for web extensions. If the web extension requires more than the specified memory alert threshold when the memory or CPU check occurs, Outlook disables the web extension. \n\nIf you disable or do not configure this policy setting, Outlook uses the default alert interval of 5 seconds. This alert interval overrides the WEF alert interval. The maximum alert interval is 600 seconds, and the minimum alert interval is 5 seconds.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\outlook","registrySubPath":"alertinterval","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OutlookDisableAutoDiscover","uniqueId":3807,"displayName":"Disable AutoDiscover","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_OutlookDisableAutoDiscover;L_OutlookDisableAutoDiscoverLkgUrl","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_OutlookDisableAutoDiscover;L_OutlookDisableAutoDiscoverScpLookup","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_OutlookDisableAutoDiscover;L_OutlookDisableAutoDiscoverRootDomain","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_OutlookDisableAutoDiscover;L_OutlookDisableAutoDiscoverAutoDiscoverSubDomain","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_OutlookDisableAutoDiscover;L_OutlookDisableAutoDiscoverHttpRedirect","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_OutlookDisableAutoDiscover;L_OutlookDisableAutoDiscoverSrvRecord","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_OutlookDisableAutoDiscover;L_OutlookDisableAutoDiscoverExplicitO365Endpoint","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_OutlookDisableAutoDiscover;L_OutlookDisableAutodiscoverV2Service","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable AutoDiscover.\n\nIf you enable this policy setting, you can select one or more of the following options to disable in the AutoDiscover feature.\n\n\"Exclude the last known good URL” – Outlook does not use the last known good Autodiscover URL.\n\n\"Exclude the SCP object lookup\" – Outlook does not perform Active Directory queries for Service Connection Point (SCP) objects with Autodiscover information.\n\n\"Exclude the root domain query based on your primary SMTP address\" - Outlook does not use the root domain of your primary SMTP address to locate the AutoDiscover service. For example, you select this optionOutlook does not use the following URL: https://<smtp-address-domain>/autodiscover/autodiscover.xml.\n\n\"Exclude the query for the AutoDiscover domain\" - Outlook does not use the Autodiscover domain to locate the Autodiscover service. For example, Outlook does not use the following URL: https://autodiscover.<smtp-address-domain>/autodiscover/autodiscover.xml\n\n\"Exclude the HTTP redirect method\" - Outlook does not use the HTTP redirect method in the event it is unable to reach the AutoDiscover service via either of the HTTPS URLs: https://<smtp-address-domain>/autodiscover/autodiscover.xml or https://autodiscover.<smtp-address-domain>/autodiscover/autodiscover.xml.\n\n\"Exclude the SRV record query in DNS\" - Outlook does not use an SRV record lookup in DNS to locate the AutoDiscover service.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_OutlookDisableAutoDiscover;L_OutlookDisableAutoDiscoverAutoDiscoverSubDomain","uniqueId":3802,"displayName":"Exclude the query for the AutoDiscover domain","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to disable AutoDiscover.\n\nIf you enable this policy setting, you can select one or more of the following options to disable in the AutoDiscover feature.\n\n\"Exclude the last known good URL” – Outlook does not use the last known good Autodiscover URL.\n\n\"Exclude the SCP object lookup\" – Outlook does not perform Active Directory queries for Service Connection Point (SCP) objects with Autodiscover information.\n\n\"Exclude the root domain query based on your primary SMTP address\" - Outlook does not use the root domain of your primary SMTP address to locate the AutoDiscover service. For example, you select this optionOutlook does not use the following URL: https://<smtp-address-domain>/autodiscover/autodiscover.xml.\n\n\"Exclude the query for the AutoDiscover domain\" - Outlook does not use the Autodiscover domain to locate the Autodiscover service. For example, Outlook does not use the following URL: https://autodiscover.<smtp-address-domain>/autodiscover/autodiscover.xml\n\n\"Exclude the HTTP redirect method\" - Outlook does not use the HTTP redirect method in the event it is unable to reach the AutoDiscover service via either of the HTTPS URLs: https://<smtp-address-domain>/autodiscover/autodiscover.xml or https://autodiscover.<smtp-address-domain>/autodiscover/autodiscover.xml.\n\n\"Exclude the SRV record query in DNS\" - Outlook does not use an SRV record lookup in DNS to locate the AutoDiscover service.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\autodiscover","registrySubPath":"excludehttpsautodiscoverdomain","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OutlookDisableAutoDiscover;L_OutlookDisableAutoDiscoverExplicitO365Endpoint","uniqueId":3805,"displayName":"Exclude initial check to Office 365 Autodiscover URL","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to disable AutoDiscover.\n\nIf you enable this policy setting, you can select one or more of the following options to disable in the AutoDiscover feature.\n\n\"Exclude the last known good URL” – Outlook does not use the last known good Autodiscover URL.\n\n\"Exclude the SCP object lookup\" – Outlook does not perform Active Directory queries for Service Connection Point (SCP) objects with Autodiscover information.\n\n\"Exclude the root domain query based on your primary SMTP address\" - Outlook does not use the root domain of your primary SMTP address to locate the AutoDiscover service. For example, you select this optionOutlook does not use the following URL: https://<smtp-address-domain>/autodiscover/autodiscover.xml.\n\n\"Exclude the query for the AutoDiscover domain\" - Outlook does not use the Autodiscover domain to locate the Autodiscover service. For example, Outlook does not use the following URL: https://autodiscover.<smtp-address-domain>/autodiscover/autodiscover.xml\n\n\"Exclude the HTTP redirect method\" - Outlook does not use the HTTP redirect method in the event it is unable to reach the AutoDiscover service via either of the HTTPS URLs: https://<smtp-address-domain>/autodiscover/autodiscover.xml or https://autodiscover.<smtp-address-domain>/autodiscover/autodiscover.xml.\n\n\"Exclude the SRV record query in DNS\" - Outlook does not use an SRV record lookup in DNS to locate the AutoDiscover service.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\autodiscover","registrySubPath":"excludeexplicito365endpoint","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OutlookDisableAutoDiscover;L_OutlookDisableAutoDiscoverHttpRedirect","uniqueId":3803,"displayName":"Exclude the HTTP redirect method","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to disable AutoDiscover.\n\nIf you enable this policy setting, you can select one or more of the following options to disable in the AutoDiscover feature.\n\n\"Exclude the last known good URL” – Outlook does not use the last known good Autodiscover URL.\n\n\"Exclude the SCP object lookup\" – Outlook does not perform Active Directory queries for Service Connection Point (SCP) objects with Autodiscover information.\n\n\"Exclude the root domain query based on your primary SMTP address\" - Outlook does not use the root domain of your primary SMTP address to locate the AutoDiscover service. For example, you select this optionOutlook does not use the following URL: https://<smtp-address-domain>/autodiscover/autodiscover.xml.\n\n\"Exclude the query for the AutoDiscover domain\" - Outlook does not use the Autodiscover domain to locate the Autodiscover service. For example, Outlook does not use the following URL: https://autodiscover.<smtp-address-domain>/autodiscover/autodiscover.xml\n\n\"Exclude the HTTP redirect method\" - Outlook does not use the HTTP redirect method in the event it is unable to reach the AutoDiscover service via either of the HTTPS URLs: https://<smtp-address-domain>/autodiscover/autodiscover.xml or https://autodiscover.<smtp-address-domain>/autodiscover/autodiscover.xml.\n\n\"Exclude the SRV record query in DNS\" - Outlook does not use an SRV record lookup in DNS to locate the AutoDiscover service.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\autodiscover","registrySubPath":"excludehttpredirect","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OutlookDisableAutoDiscover;L_OutlookDisableAutoDiscoverLkgUrl","uniqueId":3799,"displayName":"Exclude the last known good URL","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to disable AutoDiscover.\n\nIf you enable this policy setting, you can select one or more of the following options to disable in the AutoDiscover feature.\n\n\"Exclude the last known good URL” – Outlook does not use the last known good Autodiscover URL.\n\n\"Exclude the SCP object lookup\" – Outlook does not perform Active Directory queries for Service Connection Point (SCP) objects with Autodiscover information.\n\n\"Exclude the root domain query based on your primary SMTP address\" - Outlook does not use the root domain of your primary SMTP address to locate the AutoDiscover service. For example, you select this optionOutlook does not use the following URL: https://<smtp-address-domain>/autodiscover/autodiscover.xml.\n\n\"Exclude the query for the AutoDiscover domain\" - Outlook does not use the Autodiscover domain to locate the Autodiscover service. For example, Outlook does not use the following URL: https://autodiscover.<smtp-address-domain>/autodiscover/autodiscover.xml\n\n\"Exclude the HTTP redirect method\" - Outlook does not use the HTTP redirect method in the event it is unable to reach the AutoDiscover service via either of the HTTPS URLs: https://<smtp-address-domain>/autodiscover/autodiscover.xml or https://autodiscover.<smtp-address-domain>/autodiscover/autodiscover.xml.\n\n\"Exclude the SRV record query in DNS\" - Outlook does not use an SRV record lookup in DNS to locate the AutoDiscover service.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\autodiscover","registrySubPath":"excludelastknowngoodurl","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OutlookDisableAutoDiscover;L_OutlookDisableAutoDiscoverRootDomain","uniqueId":3801,"displayName":"Exclude the root domain query based on your primary SMTP address","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to disable AutoDiscover.\n\nIf you enable this policy setting, you can select one or more of the following options to disable in the AutoDiscover feature.\n\n\"Exclude the last known good URL” – Outlook does not use the last known good Autodiscover URL.\n\n\"Exclude the SCP object lookup\" – Outlook does not perform Active Directory queries for Service Connection Point (SCP) objects with Autodiscover information.\n\n\"Exclude the root domain query based on your primary SMTP address\" - Outlook does not use the root domain of your primary SMTP address to locate the AutoDiscover service. For example, you select this optionOutlook does not use the following URL: https://<smtp-address-domain>/autodiscover/autodiscover.xml.\n\n\"Exclude the query for the AutoDiscover domain\" - Outlook does not use the Autodiscover domain to locate the Autodiscover service. For example, Outlook does not use the following URL: https://autodiscover.<smtp-address-domain>/autodiscover/autodiscover.xml\n\n\"Exclude the HTTP redirect method\" - Outlook does not use the HTTP redirect method in the event it is unable to reach the AutoDiscover service via either of the HTTPS URLs: https://<smtp-address-domain>/autodiscover/autodiscover.xml or https://autodiscover.<smtp-address-domain>/autodiscover/autodiscover.xml.\n\n\"Exclude the SRV record query in DNS\" - Outlook does not use an SRV record lookup in DNS to locate the AutoDiscover service.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\autodiscover","registrySubPath":"excludehttpsrootdomain","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OutlookDisableAutoDiscover;L_OutlookDisableAutoDiscoverScpLookup","uniqueId":3800,"displayName":"Exclude the SCP object lookup","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to disable AutoDiscover.\n\nIf you enable this policy setting, you can select one or more of the following options to disable in the AutoDiscover feature.\n\n\"Exclude the last known good URL” – Outlook does not use the last known good Autodiscover URL.\n\n\"Exclude the SCP object lookup\" – Outlook does not perform Active Directory queries for Service Connection Point (SCP) objects with Autodiscover information.\n\n\"Exclude the root domain query based on your primary SMTP address\" - Outlook does not use the root domain of your primary SMTP address to locate the AutoDiscover service. For example, you select this optionOutlook does not use the following URL: https://<smtp-address-domain>/autodiscover/autodiscover.xml.\n\n\"Exclude the query for the AutoDiscover domain\" - Outlook does not use the Autodiscover domain to locate the Autodiscover service. For example, Outlook does not use the following URL: https://autodiscover.<smtp-address-domain>/autodiscover/autodiscover.xml\n\n\"Exclude the HTTP redirect method\" - Outlook does not use the HTTP redirect method in the event it is unable to reach the AutoDiscover service via either of the HTTPS URLs: https://<smtp-address-domain>/autodiscover/autodiscover.xml or https://autodiscover.<smtp-address-domain>/autodiscover/autodiscover.xml.\n\n\"Exclude the SRV record query in DNS\" - Outlook does not use an SRV record lookup in DNS to locate the AutoDiscover service.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\autodiscover","registrySubPath":"excludescplookup","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OutlookDisableAutoDiscover;L_OutlookDisableAutoDiscoverSrvRecord","uniqueId":3804,"displayName":"Exclude the SRV record query in DNS","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to disable AutoDiscover.\n\nIf you enable this policy setting, you can select one or more of the following options to disable in the AutoDiscover feature.\n\n\"Exclude the last known good URL” – Outlook does not use the last known good Autodiscover URL.\n\n\"Exclude the SCP object lookup\" – Outlook does not perform Active Directory queries for Service Connection Point (SCP) objects with Autodiscover information.\n\n\"Exclude the root domain query based on your primary SMTP address\" - Outlook does not use the root domain of your primary SMTP address to locate the AutoDiscover service. For example, you select this optionOutlook does not use the following URL: https://<smtp-address-domain>/autodiscover/autodiscover.xml.\n\n\"Exclude the query for the AutoDiscover domain\" - Outlook does not use the Autodiscover domain to locate the Autodiscover service. For example, Outlook does not use the following URL: https://autodiscover.<smtp-address-domain>/autodiscover/autodiscover.xml\n\n\"Exclude the HTTP redirect method\" - Outlook does not use the HTTP redirect method in the event it is unable to reach the AutoDiscover service via either of the HTTPS URLs: https://<smtp-address-domain>/autodiscover/autodiscover.xml or https://autodiscover.<smtp-address-domain>/autodiscover/autodiscover.xml.\n\n\"Exclude the SRV record query in DNS\" - Outlook does not use an SRV record lookup in DNS to locate the AutoDiscover service.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\autodiscover","registrySubPath":"excludesrvrecord","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OutlookDisableAutoDiscover;L_OutlookDisableAutodiscoverV2Service","uniqueId":3806,"displayName":"Disable the Autodiscover V2 service","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to disable AutoDiscover.\n\nIf you enable this policy setting, you can select one or more of the following options to disable in the AutoDiscover feature.\n\n\"Exclude the last known good URL” – Outlook does not use the last known good Autodiscover URL.\n\n\"Exclude the SCP object lookup\" – Outlook does not perform Active Directory queries for Service Connection Point (SCP) objects with Autodiscover information.\n\n\"Exclude the root domain query based on your primary SMTP address\" - Outlook does not use the root domain of your primary SMTP address to locate the AutoDiscover service. For example, you select this optionOutlook does not use the following URL: https://<smtp-address-domain>/autodiscover/autodiscover.xml.\n\n\"Exclude the query for the AutoDiscover domain\" - Outlook does not use the Autodiscover domain to locate the Autodiscover service. For example, Outlook does not use the following URL: https://autodiscover.<smtp-address-domain>/autodiscover/autodiscover.xml\n\n\"Exclude the HTTP redirect method\" - Outlook does not use the HTTP redirect method in the event it is unable to reach the AutoDiscover service via either of the HTTPS URLs: https://<smtp-address-domain>/autodiscover/autodiscover.xml or https://autodiscover.<smtp-address-domain>/autodiscover/autodiscover.xml.\n\n\"Exclude the SRV record query in DNS\" - Outlook does not use an SRV record lookup in DNS to locate the AutoDiscover service.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\autodiscover","registrySubPath":"disableautodiscoverv2service","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OutlookEnableOfficeConfigServiceInAutodiscover","uniqueId":3846,"displayName":"Allow Outlook Autodiscover to interact with Office Config Service","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether Outlook can interact with the Office Config Service to get Autodiscover V2 service endpoint URL for different sovereigns.\n\nif you enable this policy setting, Outlook will get the URL for the sovereign Autodiscover v2 service endpoint by default.\n\nIf you disable this policy setting, Outlook will get the URL for the WW Autodiscover v2 service endpoint by default.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\autodiscover","registrySubPath":"enableoffice365configservice","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OutlookMemoryAlertThreshold","uniqueId":3815,"displayName":"Specify Outlook memory alert threshold for web extensions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_OutlookMemoryAlertThreshold;L_OutlookMemoryAlertThresholdSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the memory usage limit Outlook uses before disabling a web extension during initialization. The memory alert threshold controls the maximum amount of virtual memory that can be used by a running web extension.\n\nIf you enable this policy setting, you can specify the memory alert threshold for web extensions. If the web extension requires more than the specified memory alert threshold when a memory or CPU check occurs, Outlook disables the web extension.\n\nIf you disable or do not configure this policy setting, Outlook uses the default memory usage limit of 1500 MB. This memory alert threshold overrides the WEF memory alert threshold. The maximum memory alert threshold is 1500 MB, and the minimum memory alert threshold is 1 MB.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_OutlookMemoryAlertThreshold;L_OutlookMemoryAlertThresholdSpinID","uniqueId":3814,"displayName":"(1 - 1500 MB)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":1500},"dataType":"Integer"},"defaultValue":"1500","description":"This policy setting allows you to specify the memory usage limit Outlook uses before disabling a web extension during initialization. The memory alert threshold controls the maximum amount of virtual memory that can be used by a running web extension.\n\nIf you enable this policy setting, you can specify the memory alert threshold for web extensions. If the web extension requires more than the specified memory alert threshold when a memory or CPU check occurs, Outlook disables the web extension.\n\nIf you disable or do not configure this policy setting, Outlook uses the default memory usage limit of 1500 MB. This memory alert threshold overrides the WEF memory alert threshold. The maximum memory alert threshold is 1500 MB, and the minimum memory alert threshold is 1 MB.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\outlook","registrySubPath":"memoryalertthreshold","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OutlookProtectionRules","uniqueId":3388,"displayName":"Outlook Protection Rules","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the Outlook Protection Rules add-in is enabled.\n\nIf you enable or do not configure this policy setting the add-in automatically downloads Outlook Protection Rules from Exchange and processes them when each Exchange mailbox user composes a new e-mail.  \n\nIf you disable this policy setting the add-in does not download or process Outlook Protection Rules.","supportedPlatforms":["Windows"],"tags":["Compose Messages","Mail","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\outlook\\addins\\umoutlookaddin.formregionaddin","registrySubPath":"pb4sdisabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OutlookRestartManagerRetryLimit","uniqueId":3817,"displayName":"Specify the number of restarts attempted for a running web extension","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_OutlookRestartManagerRetryLimit;L_OutlookRestartManagerRetryLimitSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the number of restarts Outlook attempts for a running web extension.\n\nIf you enable this policy setting, you can specify the number of restarts Outlook attempts for a running web extension.  If the web extension requires more than the specified number of restarts during an Outlook session, Outlook disables the web extension.\n\nIf you disable or do not configure this policy setting, Outlook uses the default restart limit of 3 occurrences. The maximum restart limit is 10 occurrences, and the minimum restart limit is 1 occurrence.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_OutlookRestartManagerRetryLimit;L_OutlookRestartManagerRetryLimitSpinID","uniqueId":3816,"displayName":"(1 - 10 occurrences)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":10},"dataType":"Integer"},"defaultValue":"3","description":"This policy setting allows you to specify the number of restarts Outlook attempts for a running web extension.\n\nIf you enable this policy setting, you can specify the number of restarts Outlook attempts for a running web extension.  If the web extension requires more than the specified number of restarts during an Outlook session, Outlook disables the web extension.\n\nIf you disable or do not configure this policy setting, Outlook uses the default restart limit of 3 occurrences. The maximum restart limit is 10 occurrences, and the minimum restart limit is 1 occurrence.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\wef\\outlook","registrySubPath":"restartmanagerretrylimit","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OutlookRichTextoptions","uniqueId":3390,"displayName":"Outlook Rich Text options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_OutlookRichTextoptions;L_WhensendingOutlookRichTextmessagestoInternetrecipients2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls how Outlook sends Rich Text Format (RTF) messages to Internet recipients.\n\nIf you enable this policy setting, you may choose from the following for handling RTF messages addressed to recipients on the Internet:\n* Convert to Plain Text format - Outlook converts the message to plain text format in the default character set. Any message formatting will be lost.\n\nIf you disable or do not configure this policy setting, Outlook automatically converts RTF formatted messages that are sent over the Internet to HTML format, so that the message formatting is maintained and attachments are received.","supportedPlatforms":["Windows"],"tags":["Internet Formatting","Mail Format","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_OutlookRichTextoptions;L_WhensendingOutlookRichTextmessagestoInternetrecipients2","uniqueId":3389,"displayName":"Use this format:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Convert to Plain Text format","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This policy setting controls how Outlook sends Rich Text Format (RTF) messages to Internet recipients.\n\nIf you enable this policy setting, you may choose from the following for handling RTF messages addressed to recipients on the Internet:\n* Convert to Plain Text format - Outlook converts the message to plain text format in the default character set. Any message formatting will be lost.\n\nIf you disable or do not configure this policy setting, Outlook automatically converts RTF formatted messages that are sent over the Internet to HTML format, so that the message formatting is maintained and attachments are received.","supportedPlatforms":["Windows"],"tags":["Internet Formatting","Mail Format","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"message rtf format","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OutlookSecurityMode","uniqueId":3456,"displayName":"Outlook Security Mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_OutlookSecurityMode;L_OutlookSecurityPolicy","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls which set of security settings are enforced in Outlook. \n\nIf you enable this policy setting, you can choose from four options for enforcing Outlook security settings: \n\n* Outlook Default Security - This option is the default configuration in Outlook. Users can configure security themselves, and Outlook ignores any security-related settings configured in Group Policy. \n\n* Use Security Form from 'Outlook Security Settings' Public Folder - Outlook uses the settings from the security form published in the designated public folder. \n\n* Use Security Form from 'Outlook 10 Security Settings' Public Folder - Outlook uses the settings from the security form published in the designated public folder. \n\n* Use Outlook Security Group Policy - Outlook uses security settings from Group Policy. \n\nImportant -  You must enable this policy setting if you want to apply the other Outlook security policy settings mentioned in this guide. \n\nIf you disable or do not configure this policy setting, Outlook users can configure security for themselves, and Outlook ignores any security-related settings that are configured in Group Policy. \n\nNote -  In previous versions of Outlook, when security settings were published in a form in Exchange Server public folders, users who needed these settings required the HKEY_CURRENT_USER\\Software\\Policies\\Microsoft\\Security\\CheckAdminSettings registry key to be set on their computers for the settings to apply. In Outlook, the CheckAdminSettings registry key is no longer used to determine users' security settings. Instead, the Outlook Security Mode setting can be used to determine whether Outlook security should be controlled directly by Group Policy, by the security form from the Outlook Security Settings Public Folder, or by the settings on users' own computers.","supportedPlatforms":["Windows"],"tags":["Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_OutlookSecurityMode;L_OutlookSecurityPolicy","uniqueId":3455,"displayName":"Outlook Security Policy:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Outlook Default Security","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use Security Form from 'Outlook Security Settings' Public Folder","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use Security Form from 'Outlook 10 Security Settings' Public Folder","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use Outlook Security Group Policy","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":3,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls which set of security settings are enforced in Outlook. \n\nIf you enable this policy setting, you can choose from four options for enforcing Outlook security settings: \n\n* Outlook Default Security - This option is the default configuration in Outlook. Users can configure security themselves, and Outlook ignores any security-related settings configured in Group Policy. \n\n* Use Security Form from 'Outlook Security Settings' Public Folder - Outlook uses the settings from the security form published in the designated public folder. \n\n* Use Security Form from 'Outlook 10 Security Settings' Public Folder - Outlook uses the settings from the security form published in the designated public folder. \n\n* Use Outlook Security Group Policy - Outlook uses security settings from Group Policy. \n\nImportant -  You must enable this policy setting if you want to apply the other Outlook security policy settings mentioned in this guide. \n\nIf you disable or do not configure this policy setting, Outlook users can configure security for themselves, and Outlook ignores any security-related settings that are configured in Group Policy. \n\nNote -  In previous versions of Outlook, when security settings were published in a form in Exchange Server public folders, users who needed these settings required the HKEY_CURRENT_USER\\Software\\Policies\\Microsoft\\Security\\CheckAdminSettings registry key to be set on their computers for the settings to apply. In Outlook, the CheckAdminSettings registry key is no longer used to determine users' security settings. Instead, the Outlook Security Mode setting can be used to determine whether Outlook security should be controlled directly by Group Policy, by the security form from the Outlook Security Settings Public Folder, or by the settings on users' own computers.","supportedPlatforms":["Windows"],"tags":["Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"adminsecuritymode","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OutlookTNEFinSMIMEmessages","uniqueId":3509,"displayName":"Always use TNEF formatting in S/MIME messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to specify the formatting when sending S/MIME messages.\n\nIf you enable this policy setting, Outlook always uses TNEF formatting when sending S/MIME messages.\n\nIf you disable or do not configure this policy setting, Outlook uses the format specified by the user when sending e-mail messages, including when sending S/MIME messages.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"forcetnef","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OutlookTodayavailability","uniqueId":3655,"displayName":"Outlook Today availability","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checked: Displays the customizable Outlook Today page. | Unchecked: Displays a standard folder view in place of Outlook Today.","supportedPlatforms":["Windows"],"tags":["Outlook Today Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\today","registrySubPath":"disable","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Overridepublishedsyncinteral","uniqueId":3632,"displayName":"Override published sync interval","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, Outlook follows the sync interval specified by the Internet Calendar publisher and Internet Calendar subscriptions will not be sync'd more often than allowed by the Internet Calendar publisher.  This setting allows you to prevent users from overriding the sync interval published by Internet Calendar publishers.","supportedPlatforms":["Windows"],"tags":["Internet Calendars","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\webcal","registrySubPath":"ignorettl","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_overridepublishedsyncinteral36","uniqueId":3645,"displayName":"Override published sync interval","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to prevent users from overriding the sync interval published by managed SharePoint lists.\n\nIf you enable this policy setting, the \"Update Limit\" checkbox found under File tab | Info | Account Settings | SharePoint List | Change… is disabled, and the user's connected SharePoint lists will only sync as defined by the list's administrator.\n\nIf you disable this policy setting, then individual users will be able to override the sync interval by unchecking the \"Update Limit\" checkbox in the SharePoint List's Options dialog. Defined sync intervals can range from 1 minute to 1440 minutes (a full day).\n\nIf you do not configure this policy setting, the user's profile will sync the SharePoint list at a default of 20 minutes or as specified by the administrator of the SharePoint list.","supportedPlatforms":["Windows"],"tags":["SharePoint Lists","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\wss","registrySubPath":"ignorettl","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Overridepublishedsyncinterval","uniqueId":3625,"displayName":"Override published sync interval","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to ignore the synchronization interval specified by the RSS publisher.  By default, Outlook follows the synchronization interval specified by the RSS publisher and RSS Feeds will not be synchronized more often than allowed by the RSS publisher.  If Outlook does not follow the RSS publisher's synchronization interval, the RSS publisher may suspend Outlook from synchronizing the RSS Feed.\n\nIf you enable this policy setting, Outlook will always ignore the synchronization interval specified by the RSS publisher.\n\nIf you disable or do not configure this policy setting, Outlook will always follow the synchronization interval specified by the RSS publisher.","supportedPlatforms":["Windows"],"tags":["RSS Feeds","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\rss","registrySubPath":"ignorettl","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_OverwriteorAppendJunkMailImportList","uniqueId":3377,"displayName":"Overwrite or Append Junk Mail Import List","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, when a new Junk E-mail Filter list is deployed, Outlook appends the new Junk Mail Import List to the existing list. Enable this setting to replace the existing list with the new list, instead of appending to the current list.","supportedPlatforms":["Windows"],"tags":["Junk E-mail","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"junkmailimportappend","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_PathtoDAVserver;L_Empty","uniqueId":3298,"displayName":"Path to DAV server","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This setting allows you to define the path to a DAV server that should be used when users publish their calendars via DAV.","supportedPlatforms":["Windows"],"tags":["Office.com Sharing Service","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\pubcal","registrySubPath":"davserverpath","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_PathtoDAVserver","uniqueId":3299,"displayName":"Path to DAV server","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_PathtoDAVserver;L_Empty","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This setting allows you to define the path to a DAV server that should be used when users publish their calendars via DAV.","supportedPlatforms":["Windows"],"tags":["Office.com Sharing Service","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_PermanentlydeleteJunkEmail","uniqueId":3373,"displayName":"Permanently delete Junk E-mail","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether suspected junk e-mail is permanently deleted instead of moved to the Junk E-mail folder.\n\nIf you enable this policy setting, suspected junk e-mail is immediately deleted and not moved into the Deleted Items folder.\n\nIf you disable or do not configure this policy setting, suspected junk e-mail is moved into the Junk E-mail folder.","supportedPlatforms":["Windows"],"tags":["Junk E-mail","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"junkmailpermdelete","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Permanentlyremovealldeleteditems","uniqueId":3764,"displayName":"Permanently remove all deleted content from PST and OST files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, a small percentage of deleted data is not overwritten in Outlook PST and OST files. By enabling this setting, all deleted data in PST and OST files is overwritten when users exit Outlook.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\pst","registrySubPath":"pstnullfreeonclose","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_PermitdownloadofcontentfromSafeSenderandRecipientlists","uniqueId":3545,"displayName":"Automatically download content for e-mail from people in Safe Senders and Safe Recipients Lists","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook automatically downloads external content in e-mail from senders in the Safe Senders List or Safe Recipients List. \n\nIf you enable this policy setting, Outlook automatically downloads content for e-mail from people in Safe Senders and Safe Recipients lists. \n\nIf you disable this policy setting, Outlook will not automatically download content from external servers for messages sent by people listed in users' Safe Senders Lists or Safe Recipients Lists. Recipients can choose to download external content on a message-by-message basis. \n\nIf you do not configure this policy setting, downloads are permitted when users receive e-mail from people listed in the user's Safe Senders List or Safe Recipients List.","supportedPlatforms":["Windows"],"tags":["Automatic Picture Download Settings","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"unblockspecificsenders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Permitdownloadofcontentfromsafezones","uniqueId":3546,"displayName":"Do not permit download of content from safe zones","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook automatically downloads content from safe zones when displaying messages. \n\nIf you enable this policy setting content from safe zones will be downloaded automatically. \n\nIf you disable this policy Outlook will not automatically download content from safe zones. Recipients can choose to download external content from untrusted senders on a message-by-message basis. \n\nIf you do not configure this policy setting, Outlook automatically downloads content from sites that are considered \"safe,\" as defined in the Security tab of the Internet Options dialog box in Internet Explorer. \n\nImportant - Note that this policy setting is \"backward.\" Despite the name, disabling the policy setting prevents the download of content from safe zones and enabling the policy setting allows it.","supportedPlatforms":["Windows"],"tags":["Automatic Picture Download Settings","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"unblocksafezone","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_PersonaldistributionlistsExchangeonly","uniqueId":3608,"displayName":"Do not validate personal Contact Groups when sending e-mail messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Use only the local cache to obtain current user information when expanding a Personal Contact Group while sending e-mail","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"expandpdlusingcache","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Plaintextoptions;L_Automaticallywraptextatxcharacters","uniqueId":3391,"displayName":"Automatically wrap text at <x> characters.","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":30,"maximum":132},"dataType":"Integer"},"description":"This policy setting allows you to control how plain text messages are formatted when they are sent from Outlook. \n\nIf you enable this policy setting, text is automatically wrapped in Internet e-mail messages and attachments are encoded in UUENCODE format. \n\nIf you disable this policy setting,  Outlook uses the standard MIME format to encode attachments in plain text Outlook messages. Users will not be able to change this configuration. \n\nIf you do not configure this policy setting, the behavior is the equivalent of setting the policy to Disabled, but users can modify plain text options in Outlook when required by clicking Tools, clicking Options, clicking the Mail Format tab, clicking Internet Format, and changing the values under \"Plain text options\".","supportedPlatforms":["Windows"],"tags":["Internet Formatting","Mail Format","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"plainwraplen","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Plaintextoptions;L_EncodeattachmentsinUUENCODEformatwhensending1","uniqueId":3392,"displayName":"Encode attachments in UUENCODE format when sending a","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This policy setting allows you to control how plain text messages are formatted when they are sent from Outlook. \n\nIf you enable this policy setting, text is automatically wrapped in Internet e-mail messages and attachments are encoded in UUENCODE format. \n\nIf you disable this policy setting,  Outlook uses the standard MIME format to encode attachments in plain text Outlook messages. Users will not be able to change this configuration. \n\nIf you do not configure this policy setting, the behavior is the equivalent of setting the policy to Disabled, but users can modify plain text options in Outlook when required by clicking Tools, clicking Options, clicking the Mail Format tab, clicking Internet Format, and changing the values under \"Plain text options\".","supportedPlatforms":["Windows"],"tags":["Internet Formatting","Mail Format","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"message plain format mime","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Plaintextoptions","uniqueId":3393,"displayName":"Plain text options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Plaintextoptions;L_Automaticallywraptextatxcharacters","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Plaintextoptions;L_EncodeattachmentsinUUENCODEformatwhensending1","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to control how plain text messages are formatted when they are sent from Outlook. \n\nIf you enable this policy setting, text is automatically wrapped in Internet e-mail messages and attachments are encoded in UUENCODE format. \n\nIf you disable this policy setting,  Outlook uses the standard MIME format to encode attachments in plain text Outlook messages. Users will not be able to change this configuration. \n\nIf you do not configure this policy setting, the behavior is the equivalent of setting the policy to Disabled, but users can modify plain text options in Outlook when required by clicking Tools, clicking Options, clicking the Mail Format tab, clicking Internet Format, and changing the values under \"Plain text options\".","supportedPlatforms":["Windows"],"tags":["Internet Formatting","Mail Format","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_PollingOOFWebsrvice;L_empty21","uniqueId":3453,"displayName":"Polling Out-of-office Web service","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":300000,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"5 minutes","description":"","tags":[],"dependencyGroup":null},{"value":600000,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"10 minutes","description":"","tags":[],"dependencyGroup":null},{"value":900000,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"15 minutes (default)","description":"","tags":[],"dependencyGroup":null},{"value":1200000,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"20 minutes","description":"","tags":[],"dependencyGroup":null},{"value":1500000,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"25 minutes","description":"","tags":[],"dependencyGroup":null},{"value":1800000,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"30 minutes","description":"","tags":[],"dependencyGroup":null},{"value":2100000,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"35 minutes","description":"","tags":[],"dependencyGroup":null},{"value":2400000,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"40 minutes","description":"","tags":[],"dependencyGroup":null},{"value":2700000,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"45 minutes","description":"","tags":[],"dependencyGroup":null},{"value":3000000,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"50 minutes","description":"","tags":[],"dependencyGroup":null},{"value":3600000,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1 hour","description":"","tags":[],"dependencyGroup":null},{"value":7200000,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"2 hours","description":"","tags":[],"dependencyGroup":null},{"value":14400000,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"4 hours","description":"","tags":[],"dependencyGroup":null},{"value":28800000,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"8 hours","description":"","tags":[],"dependencyGroup":null},{"value":86400000,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"24 hours","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":900000,"description":"By default, the Out Of Office (OOF) Web service is polled every 15 minutes (900000 milliseconds). This setting allows you to set the maximum number of milliseconds that elapse before Outlook polls the OOF Web service for OOF status.","supportedPlatforms":["Windows"],"tags":["Out of Office Assistant","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\oof","registrySubPath":"oofpollfrequency","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_PollingOOFWebsrvice","uniqueId":3454,"displayName":"Polling Out-of-office Web service","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_PollingOOFWebsrvice;L_empty21","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"By default, the Out Of Office (OOF) Web service is polled every 15 minutes (900000 milliseconds). This setting allows you to set the maximum number of milliseconds that elapse before Outlook polls the OOF Web service for OOF status.","supportedPlatforms":["Windows"],"tags":["Out of Office Assistant","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_PreferProvidedEmailInAutoDiscoverAuthPrompts","uniqueId":3835,"displayName":"Prefer the provided account email in AutoDiscover auth prompts.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"If set, this policy setting governs the displayed email in auth prompts related to AutoDiscover.\n\n        Default (0): Prefers the account UPN, when available.\n\n        If you enable this setting, then AutoDiscover auth prompts will prefer the provided account email (can be either SMTP or UPN depending on which was configured).","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\autodiscover","registrySubPath":"preferprovidedemailinautodiscoverauthprompts","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_PreferredPSTModeUnicodeANSI;L_ChooseadefaultformatfornewPSTs","uniqueId":3754,"displayName":"Choose a default format for new PSTs","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prefer Unicode PST","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prefer ANSI PST","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enforce Unicode PST","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enforce ANSI PST","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Specifies whether new PST files created by the user are to be in Unicode or ANSI format, and whether the user is allowed to choose that format.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook","registrySubPath":"newpstformat","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_PreferredPSTModeUnicodeANSI","uniqueId":3755,"displayName":"Preferred PST Mode (Unicode/ANSI)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_PreferredPSTModeUnicodeANSI;L_ChooseadefaultformatfornewPSTs","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies whether new PST files created by the user are to be in Unicode or ANSI format, and whether the user is allowed to choose that format.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_PreventClearSignedMessageAndAttachmentIndexing","uniqueId":3203,"displayName":"Prevent clear signed message and attachment indexing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off the indexing of the body and attachments of clear-text signed messages.  The sender, subject line, and date will continue to be indexed and searchable. \n\nIf you enable this policy setting, indexing of clear-text signed messages will be turned off.\n\nIf you disable or do not configure this policy setting, clear-text signed messages will be indexed and searchable.","supportedPlatforms":["Windows"],"tags":["Search Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\windows\\windows search\\preferences","registrySubPath":"preventclearsignedmsgandattachmentindexing","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_PreventCopyingOrMovingItemsBetweenAccounts","uniqueId":3594,"displayName":"Prevent copying or moving items between accounts","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"Boolean"},"description":"This policy setting allows you to prevent items from being copied or moved to other accounts or PSTs.\n\nIf you enable this policy setting, items will be prevented from being moved or copied to other accounts or PSTs.  Enter one of the following details:\n\n- \"Contoso.com\": prevents copying or moving from the account corresponding to the listed domain\n- \"*\":  prevents copying from all accounts and PST's\n- \"SharePoint\": prevents copies or moves from the SharePoint PST\n\nIf you disable or do not configure this policy setting, copying or moving items between accounts or PSTs is allowed.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook","registrySubPath":"","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_PreventMAPIservicesfrombeingadded","uniqueId":3744,"displayName":"Prevent MAPI services from being added","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_PreventMAPIservicesfrombeingadded;L_PreventMAPIservicesfrombeingaddedPart","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"By default, any MAPI service can be added to a user profile as an Outlook account. This setting allows you to prevent users from adding a specific MAPI services on the list of services. To prevent adding a MAPI service, append the name of the service to the list of services stored in this setting, separated by from a previous name by a semi-colon (;). For example, if you wanted to prevent adding the Outlook Mobile Service and Live Meeting Transport, you would configure this setting \"MSOMS;LiveMeeting\".","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_PreventMAPIservicesfrombeingadded;L_PreventMAPIservicesfrombeingaddedPart","uniqueId":3743,"displayName":"Enter MAPI services to disable (semi-colon delimited)","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"By default, any MAPI service can be added to a user profile as an Outlook account. This setting allows you to prevent users from adding a specific MAPI services on the list of services. To prevent adding a MAPI service, append the name of the service to the list of services stored in this setting, separated by from a previous name by a semi-colon (;). For example, if you wanted to prevent adding the Outlook Mobile Service and Live Meeting Transport, you would configure this setting \"MSOMS;LiveMeeting\".","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options","registrySubPath":"disablecreateservices","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_PreventMyDepartmentCalendarFromAppearing","uniqueId":3307,"displayName":"Prevent My Department Calendar from appearing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting prevents My Department Calendar from appearing in the navigation pane.\n\nIf you enable this policy setting, My Department Calendar will not appear in the navigation pane.\n\nIf you disable or do not configure this policy setting, My Department Calendar will appear in the navigation pane.","supportedPlatforms":["Windows"],"tags":["Schedule View","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\wunderbar","registrySubPath":"disabledepartmenttree","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_PreventNondefaultExchangeAccounts","uniqueId":3798,"displayName":"Prevent adding non-default Exchange accounts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy allows you to prevent users from adding non-default Exchange accounts to existing Outlook profiles.\n\nIf you enable this policy setting, you will prevent users from adding non-default Exchange accounts via the Add New E-mail Account wizard.\n\nIf you disable or do not configure this policy setting, users can add non-default Exchange accounts to existing Outlook profiles.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\exchange","registrySubPath":"disablemultipleexchange","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_PreventOtherDepartmentCalendarFromAppearing","uniqueId":3308,"displayName":"Prevent Other Department Calendar from appearing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting prevents Other Department Calendar from appearing in the navigation pane.\n\nIf you enable this policy setting, Other Department Calendar will not appear in the navigation pane.\n\nIf you disable or do not configure this policy setting, Other Department Calendar will appear in the navigation pane.","supportedPlatforms":["Windows"],"tags":["Schedule View","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\wunderbar","registrySubPath":"disableotherdepartmentcalendar","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_PreventpublishingtoaDAVserver","uniqueId":3297,"displayName":"Prevent publishing to a DAV server","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook users can publish their calendars to a DAV server. \n\nIf you enable this policy setting, Outlook users cannot publish their calendars to a DAV server. \n\nIf you disable or do not configure this policy setting, Outlook users can share their calendars with others by publishing them to a server that supports the World Wide Web Distributed Authoring and Versioning (WebDAV) protocol.","supportedPlatforms":["Windows"],"tags":["Office.com Sharing Service","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\pubcal","registrySubPath":"disabledav","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_PreventpublishingtoOfficeOnline","uniqueId":3296,"displayName":"Prevent publishing to Office.com","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook users can publish their calendars to the Office.com Calendar Sharing Service. \n\nIf you enable this policy setting, Outlook users cannot publish their calendars to Office.com. \n\nIf you disable do not configure this policy setting, Outlook users can share their calendars with selected others by publishing them to the Microsoft Outlook Calendar Sharing Service. Users can control who can view their calendar and at what level of detail.","supportedPlatforms":["Windows"],"tags":["Office.com Sharing Service","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\pubcal","registrySubPath":"disableofficeonline","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_PreventReportingLineGroupCalendarFromAppearing","uniqueId":3310,"displayName":"Prevent Reporting Line Group Calendar from appearing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting prevents Reporting Line Group Calendar from appearing in the navigation pane.\n\nIf you enable this policy setting, Reporting Line Group Calendar will not appear in the navigation pane.\n\nIf you disable or do not configure this policy setting, My Reporting Line Group Calendar will appear in the navigation pane.","supportedPlatforms":["Windows"],"tags":["Schedule View","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\wunderbar","registrySubPath":"disablereportinglinegroupcalendar","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_PreventSavingCredentialsForBasicAuthenticationPolicy","uniqueId":3576,"displayName":"Prevent saving credentials for Basic Authentication policy","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to prevent Outlook from saving user credentials using Basic Authentication.\n\nIf you enable this policy setting, Outlook will not save user credentials using Basic Authentication.\n\nIf you disable or do not configure this policy setting, Outlook will allow the user to save credentials when using Basic Authentication against a server. These credentials are stored as generic and retrievable by any process running with that user's rights on the machine.","supportedPlatforms":["Windows"],"tags":["E-mail","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\rpc","registrySubPath":"disablebasicauthsavedcreds","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_PreventSavingSyncConflicts","uniqueId":3424,"displayName":"Prevent saving sync conflicts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to prevent saving of sync conflicts.\n\nIf you enable this policy setting, Outlook will not save sync conflicts.\n\nIf you disable or do not configure this policy setting, all conflicts except those related to Calendar and RSS items are saved by default.","supportedPlatforms":["Windows"],"tags":["Advanced","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options","registrySubPath":"discardconflicts","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_PreventShutdownIfExternalReferencesExist","uniqueId":3728,"displayName":"Prevent shutdown if external references exist","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook should ignore external references during shutdown.\n\nIf you enable this policy setting, shutdown will not occur if external references exist.\n\nIf you disable or do not configure this policy setting, external references will be ignored during shutdown.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\shutdown","registrySubPath":"allowshutdownwithexternalreferences","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_PreventSocialNetworkConnectivity","uniqueId":3788,"displayName":"Disable Office connections to social networks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting prevents users from connecting Office to social networks (including SharePoint), and prevents Office from displaying contacts and feeds from their social networks.\n\nIf you enable this policy setting, users cannot connect Office to social networks.\n\nIf you disable or you do not configure this policy setting, users can connect Office to social networks.","supportedPlatforms":["Windows"],"tags":["Outlook Social Connector","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\outlook\\socialconnector","registrySubPath":"disablesocialnetworkconnectivity","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Preventusersfromaddingemailaccounttypes;L_PreventusersfromaddingEASemailaccounts","uniqueId":3770,"displayName":"Prevent users from adding Exchange ActiveSync e-mail accounts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Disables/Enables the option for adding e-mail account of the associated type in the Server Types page of the E-mail Accounts dialog box.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options","registrySubPath":"disableeas","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Preventusersfromaddingemailaccounttypes","uniqueId":3774,"displayName":"Prevent users from adding e-mail account types","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Preventusersfromaddingemailaccounttypes;L_PreventusersfromaddingExchangeemailaccounts","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Preventusersfromaddingemailaccounttypes;L_PreventusersfromaddingEASemailaccounts","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Preventusersfromaddingemailaccounttypes;L_PreventusersfromaddingPOP3emailaccounts","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Preventusersfromaddingemailaccounttypes;L_PreventusersfromaddingIMAPemailaccounts","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Preventusersfromaddingemailaccounttypes;L_Preventusersfromaddingothertypesofemailaccounts","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Disables/Enables the option for adding e-mail account of the associated type in the Server Types page of the E-mail Accounts dialog box.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Preventusersfromaddingemailaccounttypes;L_PreventusersfromaddingExchangeemailaccounts","uniqueId":3769,"displayName":"Prevent users from adding Exchange e-mail accounts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Disables/Enables the option for adding e-mail account of the associated type in the Server Types page of the E-mail Accounts dialog box.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options","registrySubPath":"disableexchange","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Preventusersfromaddingemailaccounttypes;L_PreventusersfromaddingIMAPemailaccounts","uniqueId":3772,"displayName":"Prevent users from adding IMAP e-mail accounts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Disables/Enables the option for adding e-mail account of the associated type in the Server Types page of the E-mail Accounts dialog box.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options","registrySubPath":"disableimap","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Preventusersfromaddingemailaccounttypes;L_Preventusersfromaddingothertypesofemailaccounts","uniqueId":3773,"displayName":"Prevent users from adding other types of e-mail accounts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Disables/Enables the option for adding e-mail account of the associated type in the Server Types page of the E-mail Accounts dialog box.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options","registrySubPath":"disableothertypes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Preventusersfromaddingemailaccounttypes;L_PreventusersfromaddingPOP3emailaccounts","uniqueId":3771,"displayName":"Prevent users from adding POP3 e-mail accounts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Disables/Enables the option for adding e-mail account of the associated type in the Server Types page of the E-mail Accounts dialog box.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options","registrySubPath":"disablepop3","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Preventusersfromaddingnewcontentto","uniqueId":3749,"displayName":"Prevent users from adding new content to existing PST files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This setting prevents users from adding any new content to PST files linked to their profiles.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\pst","registrySubPath":"pstdisablegrow","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Preventusersfromaddingpsts;L_empty78","uniqueId":3747,"displayName":"Prevent users from adding PSTs to Outlook profiles and/or prevent using Sharing-Exclusive PSTs","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"(default) PSTs can be added","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No PSTs can be added","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Only Sharing-Exclusive PSTs can be added","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"By default, users can add PSTs to their Outlook profiles and can use Sharing-Exclusive PSTs for storing SharePoint Lists and Internet Calendars. You can use this setting to limit users' ability to store mail in a decentralized fashion. You can block the use of PSTs completely, but be aware that blocking all PSTs disables Outlook features such as SharePoint Lists and Internet Calendar. \n\nIf instead you allow only Sharing-Exclusive PSTs to be added to user profiles, PST usage is still limited but the Outlook features that rely on special PSTs are not disabled. The setting that allows Sharing-Exclusive PSTs to be added blocks users from creating new folders in the Sharing-Exclusive PST; copying existing mail folders from their default store to the PST; and copying individual mail items to the root of the PST.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook","registrySubPath":"disablepst","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Preventusersfromaddingpsts","uniqueId":3748,"displayName":"Prevent users from adding PSTs to Outlook profiles and/or prevent using Sharing-Exclusive PSTs","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Preventusersfromaddingpsts;L_empty78","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"By default, users can add PSTs to their Outlook profiles and can use Sharing-Exclusive PSTs for storing SharePoint Lists and Internet Calendars. You can use this setting to limit users' ability to store mail in a decentralized fashion. You can block the use of PSTs completely, but be aware that blocking all PSTs disables Outlook features such as SharePoint Lists and Internet Calendar. \n\nIf instead you allow only Sharing-Exclusive PSTs to be added to user profiles, PST usage is still limited but the Outlook features that rely on special PSTs are not disabled. The setting that allows Sharing-Exclusive PSTs to be added blocks users from creating new folders in the Sharing-Exclusive PST; copying existing mail folders from their default store to the PST; and copying individual mail items to the root of the PST.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Preventusersfromcustomizingattachmentsecuritysettings","uniqueId":3494,"displayName":"Prevent users from customizing attachment security settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting prevents users from overriding the set of attachments blocked by Outlook.\n\nIf you enable this policy setting users will be prevented from overriding the set of attachments blocked by Outlook.  Outlook also checks the \"Level1Remove\" registry key when this setting is specified. \n\nIf you disable or do not configure this policy setting, users will be allowed to override the set of attachments blocked by Outlook.","supportedPlatforms":["Windows"],"tags":["Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook","registrySubPath":"disallowattachmentcustomization","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_PreventusersfrommakingchangestoOutlookprofiles","uniqueId":3775,"displayName":"Prevent users from making changes to Outlook profiles","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to prevent users from accessing profile or account configuration tools through either Account Settings or through the Mail Control Panel Applet.\n\nIf you enable this policy setting, users will see the error, \"This feature has been disabled by your system administrator\" if they select the Account Settings button under Account Information found by clicking on the File tab.  Users will also be unable to access profile configuration the Mail Control Panel Applet.\n\nIf you disable or do not configure this policy setting, users will be able to access Account Settings and the Mail Control Panel Applet normally.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\setup","registrySubPath":"modifyaccounts","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Promotingerrorsaswarnings","uniqueId":3541,"displayName":"Promote Level 2 errors as errors, not warnings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to treat Level 2 errors as warnings instead of errors.  Level 2 errors occur when the message signature appears to be valid, but there are other issues with the signature. \n\nIf you enable this policy setting, Level 2 errors will be treated as warnings.\n\nIf you disable or do not configure this policy setting, Level 2 errors will be treated as errors\n\nWhen you specify a value for PromoteErrorsAsWarnings, note that potential Level 2 error conditions include the following:\n\n- Unknown Signature Algorithm\n- No Signing Certification Found\n- Bad Attribute Sets\n- No Issuer Certificate found\n- No CRL Found\n- Out-of-date CRL\n- Root Trust Problem\n- Out-of-date CTL","supportedPlatforms":["Windows"],"tags":["Signature Status dialog box","Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"promoteerrorsaswarnings","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Promptusertochoosesecuritysettingsifdefaultsettingsfail","uniqueId":3500,"displayName":"Prompt user to choose security settings if default settings fail","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Check to prompt the user to choose security settings if default settings fail; uncheck to automatically select.","supportedPlatforms":["Windows"],"tags":["Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"forcedefaultprofile","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_PSTNullFreeOnDelete","uniqueId":3765,"displayName":"PST Null Data on Delete","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to force Outlook to fully nullify deleted data in users’ Personal Folder files (.pst) at the time that the data is deleted.  \n \nIf you enable this policy setting, data is immediately nullified in PST files when deleted.  \n \nIf you disable or do not configure this policy setting, data remains in PST files until it is purged or overwritten by the user.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\pst","registrySubPath":"pstnullfreeondelete","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Publishinterval","uniqueId":3304,"displayName":"Publish interval","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, Outlook does not publish calendars to Office.com more often then the publish interval set by Office.com. This setting allows users to publish calendars more often than the Office.com interval specifies.","supportedPlatforms":["Windows"],"tags":["Office.com Sharing Service","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\pubcal","registrySubPath":"ignorettl","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Reademailasplaintext","uniqueId":3224,"displayName":"Read e-mail as plain text","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether Outlook renders all e-mail messages in plain text format for reading.Outlook can display e-mail messages and other items in three formats: plain text, Rich Text Format (RTF), and HTML. \n\nIf you enable this policy setting, the \"Read all standard mail in plain text\" check box option is selected in the \"E-mail Security\" section of the Trust Center and users cannot change it. This option only changes the way e-mail messages are displayed; the original message is not converted to plain text format. \n\nIf you disable or do not configure this policy setting, Outlook displays e-mail messages in whatever format they were received in.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"readasplain","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ReadingPane;L_Markitemasreadwhenselectionchanges","uniqueId":3419,"displayName":"Mark item as read when selection changes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the option \"Mark items as read when viewed in the Reading Pane\" in the Reading Pane dialog box.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"previewdontmarkuntilchange","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ReadingPane;L_Markmessagesasreadinreadingwindow","uniqueId":3417,"displayName":"Mark messages as read in reading window","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the option \"Mark items as read when viewed in the Reading Pane\" in the Reading Pane dialog box.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"previewmarkmessage","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ReadingPane","uniqueId":3421,"displayName":"Reading Pane","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_ReadingPane;L_Markmessagesasreadinreadingwindow","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_ReadingPane;L_Waitxxxsecondsbeforemarkingitemsasread","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_ReadingPane;L_Markitemasreadwhenselectionchanges","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_ReadingPane;L_Singlekeyreadingusingspacebar","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Checks/Unchecks the option \"Mark items as read when viewed in the Reading Pane\" in the Reading Pane dialog box.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_ReadingPane;L_Singlekeyreadingusingspacebar","uniqueId":3420,"displayName":"Single key reading using spacebar","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the option \"Mark items as read when viewed in the Reading Pane\" in the Reading Pane dialog box.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"singlekeyreading","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ReadingPane;L_Waitxxxsecondsbeforemarkingitemsasread","uniqueId":3418,"displayName":"Wait xxx seconds before marking items as read:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":999},"dataType":"Integer"},"description":"Checks/Unchecks the option \"Mark items as read when viewed in the Reading Pane\" in the Reading Pane dialog box.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"previewwaitseconds","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Readsignedemailasplaintext","uniqueId":3225,"displayName":"Read signed e-mail as plain text","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether Outlook renders all digitally signed e-mail in plain text format for reading.  Outlook can display e-mail messages and other items in three formats: plain text, Rich Text Format (RTF), and HTML. \n\nIf you enable this policy setting, the \"Read all standard mail in plain text\" check box option is selected in the \"E-mail Security\" section of the Trust Center and users cannot change it. This option only changes the way e-mail messages are displayed; the original message is not converted to plain text format. \n\nIf you disable or do not configure this policy setting, Outlook displays digitally signed e-mail messages in the format they were received in.","supportedPlatforms":["Windows"],"tags":["E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"readsignedasplain","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_RecommendOutlookExtension","uniqueId":3854,"displayName":"Recommend the Microsoft Outlook Extension","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Windows 10 users of the Outlook app and the Outlook web app will see a recommendation to install the new Microsoft Outlook extension for Microsoft Edge. If a user chooses to click the recommendation, they will be taken to the Microsoft Outlook extension page where they can choose to install this web-based, productivity add on. Your users can dismiss the recommendation and will only see the recommendation twice. If your users choose to install the extension, they will be able to access their mail, calendar, contacts, and tasks from an icon in Microsoft Edge without requiring that they open another browser tab. The extension is a “mini” version of Outlook on the web which operates as a one-click flyout from the browser header.\n\nIn the future, Microsoft may release a version of this extension for the Chrome browser. Microsoft will respect this policy for future promotions of a Chrome extension, as well.\n\nIf you enable or do not configure this policy setting, the recommendation will be presented to the user.\n\nIf you disable this policy setting, the recommendation will not be presented to the user.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise and Outlook web app.\n\nFor more information, see https://go.microsoft.com/fwlink/?linkid=2165458","supportedPlatforms":["Windows","Web"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"recommendoutlookextension","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_RemindersonCalendaritems","uniqueId":3320,"displayName":"Do not display reminders on Calendar items by default","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, when users create Calendar items, the Reminder: check box in the item is set. By disabling this setting, you can change the default behavior so that the Reminder: check box is cleared by default .","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"apptreminders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Reminders;L_Displaythereminder","uniqueId":3433,"displayName":"Display the reminder","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Reminder Options","Advanced","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\reminders","registrySubPath":"type","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Reminders;L_Playremindersound","uniqueId":3434,"displayName":"Play reminder sound","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Reminder Options","Advanced","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\reminders","registrySubPath":"playsound","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Reminders","uniqueId":3435,"displayName":"Reminders","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Reminders;L_Displaythereminder","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Reminders;L_Playremindersound","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Reminder Options","Advanced","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_RepliesOrForwardsToSignedEncryptedMessagesAreSignedEncrypted","uniqueId":3502,"displayName":"Replies or forwards to signed/encrypted messages are signed/encrypted","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether replies and forwards to signed/encrypted mail should also be signed/encrypted.  \n\nIf you enable this policy setting, signing/encryption will be turned on when replying/forwarding a signed or encrypted message, even if the user is not configured for SMIME.\n\nIf you disable or do not configure this policy setting, signing/encryption is not enforced.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"nocheckonsessionsecurity","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_RequestanSMIMEreceiptforallSMIMEsignedmessages","uniqueId":3521,"displayName":"Request an S/MIME receipt for all S/MIME signed messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook sends S/MIME receipt requests with S/MIME signed messages.\n\nIf you enable this policy setting, Outlook requests S/MIME receipts whenever it sends S/MIME signed messages and users cannot change this setting.\n\nIf you disable or do not configure this policy setting, Outlook does not send S/MIME receipt requests with signed messages, but users can still include receipt requests with individual messages. If you disable this policy setting, users cannot change this functionality, but if you do not configure this policy setting, users can enable the option in the \"E-mail Security\" section of the Trust Center or the \"Security Properties\" dialog for individual messages.\n\nImportant: When the \"Sign all e-mail messages\" policy setting is enabled, enabling this policy setting can place significant stress on the e-mail infrastructure. Consider your needs and capabilities before enabling both settings.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"requestsecurereceipt","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_RequiredCertificateAuthority","uniqueId":3504,"displayName":"Required Certificate Authority","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_RequiredCertificateAuthority;L_X509issueDNthatrestrictschoiceofcertifyingauthorities","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting enables you to designate a required certificate authority for Outlook to use for encryption and digital signatures.\n\nIf you enable this policy setting, you can specify a required certificate authority by entering an X.509 distinguished name in the text field that is provided. The name must conform to the X.509 certificate format exactly. For example:\n\nCN=WoodgroveBankCA, DC=WoodgroveBank, DC=com\n\nIf you disable or do not configure this policy setting, Outlook trusts any certificate authorities that are represented by certificates in the Trusted Root Certification Authorities store on users' computers.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_RequiredCertificateAuthority;L_X509issueDNthatrestrictschoiceofcertifyingauthorities","uniqueId":3503,"displayName":"X.509 issue DN that restricts choice of certifying authorities:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting enables you to designate a required certificate authority for Outlook to use for encryption and digital signatures.\n\nIf you enable this policy setting, you can specify a required certificate authority by entering an X.509 distinguished name in the text field that is provided. The name must conform to the X.509 certificate format exactly. For example:\n\nCN=WoodgroveBankCA, DC=WoodgroveBank, DC=com\n\nIf you disable or do not configure this policy setting, Outlook trusts any certificate authorities that are represented by certificates in the Trusted Root Certification Authorities store on users' computers.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"requiredca","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_RequireSuiteBAlgorithmsforSMIMEoperations","uniqueId":3532,"displayName":"Require SuiteB algorithms for S/MIME operations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether Outlook is required to use NSA Suite B algorithms for S/MIME operations. Outlook implements Suite B, a set of cryptographic algorithms for symmetric encryption, hashing, digital signatures, and key exchange announced in 2005 by the National Security Agency (NSA), a division of the United States Department of Defense. The Suite B protocols can be used to meet U.S. government standards for handling both classified and unclassified information. \n\nIf you enable this policy setting, Outlook uses only Suite B algorithms for S/MIME operations. The Suite B algorithms are as follows: \n\n- Symmetric encryption. Advanced Encryption Standard (AES) with key sizes of 128 and 256 bits. \n\n- Message digest. Secure Hash Algorithm (SHA-256 and SHA-384). \n\n- Key agreement. Elliptic-Curve Menezes-Qu-Vanstone (ECMQV); Elliptic Curve Diffie-Hellman (ECDH). \n\n- Digital Signatures. Elliptic-Curve Digital Signature Algorithm (ECDSA). \n\nIf you disable or do not configure this policy setting, Outlook can use any available algorithm for S/MIME operations, such as encryption, signing, and so on. \n\nNote - For more information about Suite B, see \"Fact Sheet NSA Suite B Cryptography\"  http://www.nsa.gov/ia/industry/crypto_suite_b.cfm.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"suitebmode","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Restrictlevelofcalendardetails;L_empty4","uniqueId":3300,"displayName":"Restrict level of calendar details users can publish","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"All options are available","description":"","tags":[],"dependencyGroup":null},{"value":8192,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disables 'Full details'","description":"","tags":[],"dependencyGroup":null},{"value":16384,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disables 'Full details' and 'Limited details'","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls the level of calendar details that Outlook users can publish to the Microsoft Outlook Calendar Sharing Service. \n\nIf you enable this policy setting, you can choose from three levels of detail: \n\n* All options are available - This level of detail is the default configuration. \n* Disables 'Full details' \n* Disables 'Full details' and 'Limited details' \n\nIf you disable or do not configure this policy setting, Outlook users can share their calendars with selected others by publishing them to the Microsoft Outlook Calendar Sharing Service. Users can choose from three levels of detail: \n\n* Availability only - Authorized visitors will see the user's time marked as Free, Busy, Tentative, or Out of Office, but will not be able to see the subjects or details of calendar items. \n* Limited details - Authorized visitors can see the user's availability and the subjects of calendar items only. They will not be able to view the details of calendar items. Optionally, users can allow visitors to see the existence of private items. \n* Full details - Authorized visitors can see the full details of calendar items. Optionally, users can allow visitors to see the existence of private items.","supportedPlatforms":["Windows"],"tags":["Office.com Sharing Service","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\pubcal","registrySubPath":"publishcalendardetailspolicy","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Restrictlevelofcalendardetails","uniqueId":3301,"displayName":"Restrict level of calendar details users can publish","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Restrictlevelofcalendardetails;L_empty4","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls the level of calendar details that Outlook users can publish to the Microsoft Outlook Calendar Sharing Service. \n\nIf you enable this policy setting, you can choose from three levels of detail: \n\n* All options are available - This level of detail is the default configuration. \n* Disables 'Full details' \n* Disables 'Full details' and 'Limited details' \n\nIf you disable or do not configure this policy setting, Outlook users can share their calendars with selected others by publishing them to the Microsoft Outlook Calendar Sharing Service. Users can choose from three levels of detail: \n\n* Availability only - Authorized visitors will see the user's time marked as Free, Busy, Tentative, or Out of Office, but will not be able to see the subjects or details of calendar items. \n* Limited details - Authorized visitors can see the user's availability and the subjects of calendar items only. They will not be able to view the details of calendar items. Optionally, users can allow visitors to see the existence of private items. \n* Full details - Authorized visitors can see the full details of calendar items. Optionally, users can allow visitors to see the existence of private items.","supportedPlatforms":["Windows"],"tags":["Office.com Sharing Service","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Restrictuploadmethod","uniqueId":3303,"displayName":"Restrict upload method","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook can automatically upload calendar updates to Office.com. \n\nIf you enable this policy setting, Outlook enforces the  \"Single Upload: Updates will not be uploaded from the Published Calendar Settings dialog\" option, and calendar updates are not uploaded. Users will not be able to change this setting.\n\nIf you disable this policy setting Outlook automatically publishes calendar updates to Office.com at regular intervals and users will not be able to change this. \n\nIf you do not configure this policy setting, when users publish their calendar to Office.com using the Microsoft Outlook Calendar Sharing Service, Outlook updates the calendars online at regular intervals unless they click \"Advanced\" and select \"Single Upload: Updates will not be uploaded from the Published Calendar Settings dialog\".","supportedPlatforms":["Windows"],"tags":["Office.com Sharing Service","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\pubcal","registrySubPath":"singleuploadonly","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_RestUpdatesForCalendar","uniqueId":3834,"displayName":"REST updates for calendars","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy determines if Outlook can use REST to update calendars.\n\n        If you enable this policy, Outlook will use REST to update supported Office 365 and Outlook.com calendars.\n\n        If you disable this policy, Outlook won't use REST to update any calendars.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"restupdatesforcalendar","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_RetrievingCRLsCertificateRevocationLists;L_empty31","uniqueId":3535,"displayName":"Retrieving CRLs (Certificate Revocation Lists)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use system Default","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"When online always retreive the CRL","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Never retreive the CRL","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how Outlook retrieves Certificate Revocation Lists to verify the validity of certificates.Certificate revocation lists (CRLs) are lists of digital certificates that have been revoked by their controlling certificate authorities (CAs), typically because the certificates were issued improperly or their associated private keys were compromised. \n\nIf you enable this policy setting, you can choose from three options to govern how Outlook uses CRLs: \n\n- Use system Default. Outlook relies on the CRL download schedule that is configured for the operating system. \n- When online always retrieve the CRL. This option is the default configuration in Outlook. \n- Never retrieve the CRL. Outlook will not attempt to download the CRL for a certificate, even if it is online. This option can reduce security. \n\nIf you disable or do not configure this policy setting, when Outlook handles a certificate that includes a URL from which a CRL can be downloaded, Outlook will retrieve the CRL from the provided URL if Outlook is online.","supportedPlatforms":["Windows"],"tags":["Signature Status dialog box","Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"usecrlchasing","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_RetrievingCRLsCertificateRevocationLists","uniqueId":3536,"displayName":"Retrieving CRLs (Certificate Revocation Lists)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_RetrievingCRLsCertificateRevocationLists;L_empty31","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls how Outlook retrieves Certificate Revocation Lists to verify the validity of certificates.Certificate revocation lists (CRLs) are lists of digital certificates that have been revoked by their controlling certificate authorities (CAs), typically because the certificates were issued improperly or their associated private keys were compromised. \n\nIf you enable this policy setting, you can choose from three options to govern how Outlook uses CRLs: \n\n- Use system Default. Outlook relies on the CRL download schedule that is configured for the operating system. \n- When online always retrieve the CRL. This option is the default configuration in Outlook. \n- Never retrieve the CRL. Outlook will not attempt to download the CRL for a certificate, even if it is online. This option can reduce security. \n\nIf you disable or do not configure this policy setting, when Outlook handles a certificate that includes a URL from which a CRL can be downloaded, Outlook will retrieve the CRL from the provided URL if Outlook is online.","supportedPlatforms":["Windows"],"tags":["Signature Status dialog box","Cryptography","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_RPCHTTPConnectionFlags","uniqueId":3584,"displayName":"RPC/HTTP Connection Flags","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_RPCHTTPConnectionFlags;L_SelectRPCHTTPConnectionFlags","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting configures connection options for Outlook Anywhere. \n\nIf you enable this policy setting, you can configure multiple connection options by selecting the flag in the drop down menu that contains the combination of settings you need. The following flags are available: \n\nIf you disable or do not configure this policy setting, Outlook uses the settings specified in Autodiscover.\n\nFlag 1: Enables the 'Connect to Microsoft Exchange using HTTP checkbox' on the Connection tab. \n\nThe following flags configure options in the Microsoft Exchange Proxy Settings dialog box: \n\nFlag 2: Enables the 'Connect using SSL only' checkbox \nFlag 3: Enables the 'Only connect to proxy servers that have this principal name in their certificate' checkbox \nFlag 4: Enables the 'On fast networks, connect using HTTP first, then connect using TCP/IP' checkbox \nFlag 5: Enables the 'On slow networks, connect using HTTP first, then connect using TCP/IP' checkbox \n","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_RPCHTTPConnectionFlags;L_SelectRPCHTTPConnectionFlags","uniqueId":3583,"displayName":"Select a combination of RPC/HTTP connection flags (see Explain tab for details):","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No Flags","description":"","tags":[],"dependencyGroup":null},{"value":47,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Flags: 1 + 2 + 3 + 4 + 5","description":"","tags":[],"dependencyGroup":null},{"value":39,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Flags: 1 + 2 + 3 + 5","description":"","tags":[],"dependencyGroup":null},{"value":43,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Flags: 1 + 2 + 4 + 5","description":"","tags":[],"dependencyGroup":null},{"value":35,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Flags: 1 + 2 + 5","description":"","tags":[],"dependencyGroup":null},{"value":41,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Flags: 1 + 4 + 5","description":"","tags":[],"dependencyGroup":null},{"value":33,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Flags: 1 + 5","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":47,"description":"This policy setting configures connection options for Outlook Anywhere. \n\nIf you enable this policy setting, you can configure multiple connection options by selecting the flag in the drop down menu that contains the combination of settings you need. The following flags are available: \n\nIf you disable or do not configure this policy setting, Outlook uses the settings specified in Autodiscover.\n\nFlag 1: Enables the 'Connect to Microsoft Exchange using HTTP checkbox' on the Connection tab. \n\nThe following flags configure options in the Microsoft Exchange Proxy Settings dialog box: \n\nFlag 2: Enables the 'Connect using SSL only' checkbox \nFlag 3: Enables the 'Only connect to proxy servers that have this principal name in their certificate' checkbox \nFlag 4: Enables the 'On fast networks, connect using HTTP first, then connect using TCP/IP' checkbox \nFlag 5: Enables the 'On slow networks, connect using HTTP first, then connect using TCP/IP' checkbox \n","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\rpc","registrySubPath":"proxyserverflags","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_RPCProxyAuthenticationSetting","uniqueId":3578,"displayName":"RPC Proxy Authentication Setting","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_RPCProxyAuthenticationSetting;L_SelectRPCProxyAuthentication","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting determines the RPC proxy authentication setting for Outlook Anywhere.\n \nIf you enable this policy setting, you can specify the proxy authentication setting that Outlook uses, and this overrides any proxy authentication setting specified in Autodiscover.\n\nIf you do not configure this policy setting Outlook uses the proxy server authentication specified in Autodiscover.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_RPCProxyAuthenticationSetting;L_SelectRPCProxyAuthentication","uniqueId":3577,"displayName":"Authentication used to connect with the proxy server:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Basic","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"NTLM","description":"","tags":[],"dependencyGroup":null},{"value":16,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Negotiate","description":"","tags":[],"dependencyGroup":null},{"value":65536,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Certificate","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This policy setting determines the RPC proxy authentication setting for Outlook Anywhere.\n \nIf you enable this policy setting, you can specify the proxy authentication setting that Outlook uses, and this overrides any proxy authentication setting specified in Autodiscover.\n\nIf you do not configure this policy setting Outlook uses the proxy server authentication specified in Autodiscover.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\rpc","registrySubPath":"proxyauthenticationservice","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_RPCProxyServerName","uniqueId":3580,"displayName":"RPC Proxy Server Name","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_RPCProxyServerName;L_RPCProxyServerNameTextID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting determines the RPC proxy server that Outlook Anywhere uses when connecting to Exchange.\n \nIf you enable this policy setting, Outlook uses only the RPC proxy server that you specify when connecting to Exchange. It ignores the proxy server specified in Autodiscover.\n\nIf you disable or do not configure this policy setting Outlook uses the RPC proxy server that is specified in Autodiscover.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_RPCProxyServerName;L_RPCProxyServerNameTextID","uniqueId":3579,"displayName":"Specify the proxy server name:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting determines the RPC proxy server that Outlook Anywhere uses when connecting to Exchange.\n \nIf you enable this policy setting, Outlook uses only the RPC proxy server that you specify when connecting to Exchange. It ignores the proxy server specified in Autodiscover.\n\nIf you disable or do not configure this policy setting Outlook uses the RPC proxy server that is specified in Autodiscover.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\rpc","registrySubPath":"proxyservername","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_RPCProxyServerPrincipalName","uniqueId":3582,"displayName":"Only connect if Proxy Server certificate has this principal name ","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_RPCProxyServerPrincipalName;L_RPCProxyServerPrincipalNameTextID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the required certificate principal name for the RPC proxy server for Outlook Anywhere. \n\nIf you enable this policy setting, you must enter a server principal name. You must precede the server name with \"msstd:\" for this configuration to work. For example, you would enter the following text if the server principal name is mail.fourthcoffee.com: \n\nmsstd:mail.fourthcoffee.com \n\nIf you disable or do not configure this setting, Outlook uses the certificate principal name that is specified in Autodiscover.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_RPCProxyServerPrincipalName;L_RPCProxyServerPrincipalNameTextID","uniqueId":3581,"displayName":"Specify the proxy server principal name (see Explain tab for details):","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting specifies the required certificate principal name for the RPC proxy server for Outlook Anywhere. \n\nIf you enable this policy setting, you must enter a server principal name. You must precede the server name with \"msstd:\" for this configuration to work. For example, you would enter the following text if the server principal name is mail.fourthcoffee.com: \n\nmsstd:mail.fourthcoffee.com \n\nIf you disable or do not configure this setting, Outlook uses the certificate principal name that is specified in Autodiscover.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\rpc","registrySubPath":"proxyserverprincipalname","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_RSSFolderHomePage","uniqueId":3661,"displayName":"RSS Folder Home Page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_RSSFolderHomePage;L_Showassociatedwebpage","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_RSSFolderHomePage;L_URLaddressofassociatedwebpage","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_RSSFolderHomePage;L_TurnoffInternetExplorersecuritychecks","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the RSS Feeds Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_RSSFolderHomePage;L_Showassociatedwebpage","uniqueId":3658,"displayName":"Show associated web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the RSS Feeds Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\rss","registrySubPath":"show","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_RSSFolderHomePage;L_TurnoffInternetExplorersecuritychecks","uniqueId":3660,"displayName":"Turn off Windows Internet Explorer security checks for this web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the RSS Feeds Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\rss","registrySubPath":"security","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_RSSFolderHomePage;L_URLaddressofassociatedwebpage","uniqueId":3659,"displayName":"URL address of associated web page:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the RSS Feeds Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\rss","registrySubPath":"url","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_RuninFIPScompliantmode","uniqueId":3515,"displayName":"Run in FIPS compliant mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook is required to use FIPS-compliant algorithms when signing and encrypting messages.  Outlook can run in a mode that complies with Federal Information Processing Standards (FIPS), a set of standards published by the National Institute of Standards and Technology (NIST) for use by non-military United States government agencies and by government contractors.\n\nIf you enable this policy setting, Outlook runs in a mode that complies with the FIPS 140-1 standard for cryptographic modules. This mode requires the use of the SHA-1 algorithm for signing and 3DES for encryption.\n\nIf you disable or do not configure this policy setting, Outlook does not run in FIPS-compliant mode. Organizations that do business with the United States government but do not run Outlook in FIPS-compliant mode risk violating the U.S. government's rules regarding the handling of sensitive information.\n\nFor more information about FIPS, see FIPS - General Information at http://www.itl.nist.gov/fipspubs/geninfo.htm","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"fipsmode","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_RunRulesonRSSItems","uniqueId":3621,"displayName":"Run rules on RSS items","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, rules are not run on RSS items.  Use this setting to make rules run on RSS items.","supportedPlatforms":["Windows"],"tags":["RSS Feeds","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\rss","registrySubPath":"enablerulesonallrss","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SaveCalendarConflicts","uniqueId":3426,"displayName":"Save calendar sync conflicts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to save calendar sync conflicts.\n\nIf you enable this policy setting, Outlook will save calendar sync conflicts.\n\nIf you disable or do not configure this policy setting, calendar sync conflicts are not saved by default.","supportedPlatforms":["Windows"],"tags":["Advanced","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options","registrySubPath":"savecalendarconflicts","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SaveMessages","uniqueId":3250,"displayName":"Save Messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SaveMessages;L_Saveunsentitemsinthisfolder","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the folder in which unsent messages are saved.","supportedPlatforms":["Windows"],"tags":["Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SaveMessages;L_Saveunsentitemsinthisfolder","uniqueId":3249,"displayName":"Save unsent items in this folder:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Outbox","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sent Items","description":"","tags":[],"dependencyGroup":null},{"value":6,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Inbox","description":"","tags":[],"dependencyGroup":null},{"value":16,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Drafts","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":4,"description":"Specifies the folder in which unsent messages are saved.","supportedPlatforms":["Windows"],"tags":["Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"save_loc","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SaveRSSConflicts","uniqueId":3425,"displayName":"Save RSS conflicts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to save RSS conflicts.\n\nIf you enable this policy setting, RSS conflicts will be saved.  This policy setting takes precedence over the \"Prevent saving sync conflicts\" policy setting.\n\nIf you disable or do not configure this policy setting, RSS conflicts are not saved.","supportedPlatforms":["Windows"],"tags":["Advanced","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options","registrySubPath":"saverssconflicts","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Secondarycalendarsettings","uniqueId":3339,"displayName":"Secondary calendar settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Secondarycalendarsettings;L_Usesecondarycalendar","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Secondarycalendarsettings;L_Setsecondarycalendarlanguage","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Checks/Unchecks the option \"Enable alternate calendar\".","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Secondarycalendarsettings;L_Setsecondarycalendarlanguage","uniqueId":3338,"displayName":"Set secondary calendar language:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1054,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Buddhist (Thai)","description":"","tags":[],"dependencyGroup":null},{"value":2052,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Chinese Lunar (Simplified Chinese)","description":"","tags":[],"dependencyGroup":null},{"value":1028,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Chinese Lunar (Traditional Chinese)","description":"","tags":[],"dependencyGroup":null},{"value":1025,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gregorian (Arabic)","description":"","tags":[],"dependencyGroup":null},{"value":1033,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gregorian (English)","description":"","tags":[],"dependencyGroup":null},{"value":1037,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gregorian (Hebrew)","description":"","tags":[],"dependencyGroup":null},{"value":1025,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gregorian (Transliterated English)","description":"","tags":[],"dependencyGroup":null},{"value":1025,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gregorian (Transliterated French)","description":"","tags":[],"dependencyGroup":null},{"value":1033,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hebrew Lunar (English)","description":"","tags":[],"dependencyGroup":null},{"value":1037,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hebrew Lunar (Hebrew)","description":"","tags":[],"dependencyGroup":null},{"value":1025,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hijri (Arabic)","description":"","tags":[],"dependencyGroup":null},{"value":1033,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hijri (English)","description":"","tags":[],"dependencyGroup":null},{"value":1041,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Japanese Lunar (Japanese)","description":"","tags":[],"dependencyGroup":null},{"value":1042,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Korean Lunar (Korean)","description":"","tags":[],"dependencyGroup":null},{"value":1041,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Rokuyou (Japanese)","description":"","tags":[],"dependencyGroup":null},{"value":1033,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Saka (English)","description":"","tags":[],"dependencyGroup":null},{"value":1081,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Saka (Hindi)","description":"","tags":[],"dependencyGroup":null},{"value":1041,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Zodiac (Japanese)","description":"","tags":[],"dependencyGroup":null},{"value":1042,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Zodiac (Korean)","description":"","tags":[],"dependencyGroup":null},{"value":2052,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Zodiac (Simplified Chinese)","description":"","tags":[],"dependencyGroup":null},{"value":1028,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Zodiac (Traditional Chinese)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1054,"description":"Checks/Unchecks the option \"Enable alternate calendar\".","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"alter calendar lang","registryType":"REG_DWORD","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"alter calendar type","enforcedValues":{"buddhist (Thai)":7,"chinese Lunar (Simplified Chinese)":15,"chinese Lunar (Traditional Chinese)":15,"gregorian (Arabic)":10,"gregorian (English)":1,"gregorian (Hebrew)":1,"gregorian (Transliterated English)":11,"gregorian (Transliterated French)":12,"hebrew Lunar (English)":8,"hebrew Lunar (Hebrew)":8,"hijri (Arabic)":6,"hijri (English)":6,"japanese Lunar (Japanese)":14,"korean Lunar (Korean)":20,"rokuyou (Japanese)":19,"saka (English)":16,"saka (Hindi)":16,"zodiac (Japanese)":18,"zodiac (Korean)":18,"zodiac (Simplified Chinese)":17,"zodiac (Traditional Chinese)":17}}]}}},{"id":"outlk16;L_Secondarycalendarsettings;L_Usesecondarycalendar","uniqueId":3337,"displayName":"Enable alternate calendar","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the option \"Enable alternate calendar\".","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"show bothcal","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SecurityLevelOutlook;L_SecurityLevel","uniqueId":3550,"displayName":"Security Level","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Always warn","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Never warn, disable all","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Warn for signed, disable unsigned","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No security check","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":3,"recommendation":"security"}],"defaultValue":2,"description":"This policy setting controls the security level for macros in Outlook. \n\nIf you enable this policy setting, you can choose from four options for handling macros in Outlook: \n\n- Always warn. This option corresponds to the \"Notifications for all macros\" option in the \"Macro Settings\" section of the Outlook Trust Center. Outlook disables all macros that are not opened from a trusted location, even if the macros are signed by a trusted publisher. For each disabled macro, Outlook displays a security alert dialog box with information about the macro and its digital signature (if present), and allows users to enable the macro or leave it disabled. \n\n- Never warn, disable all. This option corresponds to the \"Disable all macros without notification\" option in the Trust Center. Outlook disables all macros that are not opened from trusted locations, and does not notify users. \n\n- Warning for signed, disable unsigned. This option corresponds to the \"Notifications for digitally signed macros, all other macros disabled\" option in the Trust Center. Outlook handles macros as follows: \n\n--If a macro is digitally signed by a trusted publisher, the macro can run if the user has already trusted the publisher. \n\n--If a macro has a valid signature from a publisher that the user has not trusted, the security alert dialog box for the macro lets the user choose whether to enable the macro for the current session, disable the macro for the current session, or to add the publisher to the Trusted Publishers list so that it will run without prompting the user in the future. \n\n--If a macro does not have a valid signature, Outlook disables it without prompting the user, unless it is opened from a trusted location. \n\nThis option is the default configuration in Outlook. \n\n- No security check. This option corresponds to the \"Enable all macros (not recommended; potentially dangerous code can run)\" option in the Trust Center. Outlook runs all macros without prompting users. This configuration makes users' computers vulnerable to potentially malicious code and is not recommended. \n\nIf you disable or do not configure this policy setting, the behavior is the equivalent of Enabled -- Warning for signed, disable unsigned.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"level","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SecurityLevelOutlook","uniqueId":3551,"displayName":"Security setting for macros","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SecurityLevelOutlook;L_SecurityLevel","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls the security level for macros in Outlook. \n\nIf you enable this policy setting, you can choose from four options for handling macros in Outlook: \n\n- Always warn. This option corresponds to the \"Notifications for all macros\" option in the \"Macro Settings\" section of the Outlook Trust Center. Outlook disables all macros that are not opened from a trusted location, even if the macros are signed by a trusted publisher. For each disabled macro, Outlook displays a security alert dialog box with information about the macro and its digital signature (if present), and allows users to enable the macro or leave it disabled. \n\n- Never warn, disable all. This option corresponds to the \"Disable all macros without notification\" option in the Trust Center. Outlook disables all macros that are not opened from trusted locations, and does not notify users. \n\n- Warning for signed, disable unsigned. This option corresponds to the \"Notifications for digitally signed macros, all other macros disabled\" option in the Trust Center. Outlook handles macros as follows: \n\n--If a macro is digitally signed by a trusted publisher, the macro can run if the user has already trusted the publisher. \n\n--If a macro has a valid signature from a publisher that the user has not trusted, the security alert dialog box for the macro lets the user choose whether to enable the macro for the current session, disable the macro for the current session, or to add the publisher to the Trusted Publishers list so that it will run without prompting the user in the future. \n\n--If a macro does not have a valid signature, Outlook disables it without prompting the user, unless it is opened from a trusted location. \n\nThis option is the default configuration in Outlook. \n\n- No security check. This option corresponds to the \"Enable all macros (not recommended; potentially dangerous code can run)\" option in the Trust Center. Outlook runs all macros without prompting users. This configuration makes users' computers vulnerable to potentially malicious code and is not recommended. \n\nIf you disable or do not configure this policy setting, the behavior is the equivalent of Enabled -- Warning for signed, disable unsigned.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Selectthedefaultsettingforhowtofilenewcontacts;L_AdditionalContactsIndex","uniqueId":3367,"displayName":"Additional Contacts Index:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic","description":"","tags":[],"dependencyGroup":null},{"value":7,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cyrillic","description":"","tags":[],"dependencyGroup":null},{"value":15,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Greek","description":"","tags":[],"dependencyGroup":null},{"value":16,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hebrew","description":"","tags":[],"dependencyGroup":null},{"value":28,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Thai","description":"","tags":[],"dependencyGroup":null},{"value":30,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Vietnamese","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":2,"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Contact Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\contact","registrySubPath":"indextabsscript","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Selectthedefaultsettingforhowtofilenewcontacts;L_Checkforduplicatecontacts","uniqueId":3365,"displayName":"Check for duplicate contacts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Contact Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\contact","registrySubPath":"confirmduplicates","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Selectthedefaultsettingforhowtofilenewcontacts;L_DefaultFileAsorder","uniqueId":3364,"displayName":"Default File As order:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":32791,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Last First","description":"","tags":[],"dependencyGroup":null},{"value":32823,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"First Last","description":"","tags":[],"dependencyGroup":null},{"value":14870,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Company","description":"","tags":[],"dependencyGroup":null},{"value":32793,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Last, First (Company)","description":"","tags":[],"dependencyGroup":null},{"value":32792,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Company (Last, First)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":32791,"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Contact Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\contact","registrySubPath":"fileasorder","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Selectthedefaultsettingforhowtofilenewcontacts;L_DefaultFullNameorder","uniqueId":3363,"displayName":"Default Full Name order:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"E","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"First (Middle) Last","description":"","tags":[],"dependencyGroup":null},{"value":"H","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Last First","description":"","tags":[],"dependencyGroup":null},{"value":"S","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"First Last1 Last2","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"E","description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Contact Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\contact","registrySubPath":"nameparserstyle","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_Selectthedefaultsettingforhowtofilenewcontacts","uniqueId":3368,"displayName":"Select the default setting for how to file new contacts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Selectthedefaultsettingforhowtofilenewcontacts;L_DefaultFullNameorder","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Selectthedefaultsettingforhowtofilenewcontacts;L_DefaultFileAsorder","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Selectthedefaultsettingforhowtofilenewcontacts;L_Checkforduplicatecontacts","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Selectthedefaultsettingforhowtofilenewcontacts;L_ShowanadditionalContactsIndex","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Selectthedefaultsettingforhowtofilenewcontacts;L_AdditionalContactsIndex","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Contact Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Selectthedefaultsettingforhowtofilenewcontacts;L_ShowanadditionalContactsIndex","uniqueId":3366,"displayName":"Show an additional Contacts Index","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Contact Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\contact","registrySubPath":"indextabson","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Sendallsignedmessagesasclearsignedmessages","uniqueId":3520,"displayName":"Send all signed messages as clear signed messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook sends signed messages as clear text signed messages.\n\nIf you enable this policy setting, the \"Send clear text signed message when sending signed messages\" option is selected in the E-mail Security section of the Trust Center.\n\nIf you disable or do not configure this policy setting, when users sign e-mail messages with their digital signature and send them, Outlook uses the signature's private key to encrypt the digital signature but sends the messages as clear text, unless they are encrypted separately.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"clearsign","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SentItemsFolderHomePage","uniqueId":3698,"displayName":"Sent Items Folder Home Page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SentItemsFolderHomePage;L_showassociatedwebpage63","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_SentItemsFolderHomePage;L_urladdressofassociatedwebpage64","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_SentItemsFolderHomePage;L_turnoffinternetexplorersecuritychecksforthiswebpage65","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Sent Items Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SentItemsFolderHomePage;L_showassociatedwebpage63","uniqueId":3695,"displayName":"Show associated web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Sent Items Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\sent mail","registrySubPath":"show","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_SentItemsFolderHomePage;L_turnoffinternetexplorersecuritychecksforthiswebpage65","uniqueId":3697,"displayName":"Turn off Windows Internet Explorer security checks for this web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Sent Items Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\sent mail","registrySubPath":"security","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_SentItemsFolderHomePage;L_urladdressofassociatedwebpage64","uniqueId":3696,"displayName":"URL address of associated web page:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in the Home Page tab of the Sent Items Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\sent mail","registrySubPath":"url","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_SetDefaultSearchScope","uniqueId":3206,"displayName":"Set default search scope","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SetDefaultSearchScope;L_SetDefaultSearchScopeDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy allows you to specify the default search scope to be used. Users will not be able to change the default once this policy is set, but they can change the scope while running a search.\n \nIf you enable this policy, you can specify the folders that Outlook searches by default when the user begins a new search.\n \nIf you disable or do not configure this policy, Outlook searches all folders in the current mailbox when the search is initiated from the Inbox. If the search is initiated from another folder, the search only includes items from that folder. Users can still change the scope when searching.","supportedPlatforms":["Windows"],"tags":["Search Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SetDefaultSearchScope;L_SetDefaultSearchScopeDropID","uniqueId":3205,"displayName":"Set default search scope","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Default behavior (see explanation)","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"\"All Mailboxes\" on all folders","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"\"Current Folder\" on all folders","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"\"Current Mailbox\" on all folders","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy allows you to specify the default search scope to be used. Users will not be able to change the default once this policy is set, but they can change the scope while running a search.\n \nIf you enable this policy, you can specify the folders that Outlook searches by default when the user begins a new search.\n \nIf you disable or do not configure this policy, Outlook searches all folders in the current mailbox when the search is initiated from the Inbox. If the search is initiated from another folder, the search only includes items from that folder. Users can still change the scope when searching.","supportedPlatforms":["Windows"],"tags":["Search Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\search","registrySubPath":"defaultsearchscope","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SetGALContactSynchronizationInterval","uniqueId":3784,"displayName":"Set GAL contact synchronization interval","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SetGALContactSynchronizationInterval;L_SetGALContactSynchronizationIntervalSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls how often contact information is synchronized between Outlook and connected social networks (in minutes).  \n\nIf you enable this policy setting, you may specify the specified interval (in minutes) in which contact information is synchronized.\n\nIf you disable or you do not configure this policy setting, contact information is synchronized at the default interval (once every 4 days, or 5760 minutes).","supportedPlatforms":["Windows"],"tags":["Outlook Social Connector","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SetGALContactSynchronizationInterval;L_SetGALContactSynchronizationIntervalSpinID","uniqueId":3783,"displayName":"Synchronization interval (in minutes):","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":10080},"dataType":"Integer"},"defaultValue":"5760","description":"This policy setting controls how often contact information is synchronized between Outlook and connected social networks (in minutes).  \n\nIf you enable this policy setting, you may specify the specified interval (in minutes) in which contact information is synchronized.\n\nIf you disable or you do not configure this policy setting, contact information is synchronized at the default interval (once every 4 days, or 5760 minutes).","supportedPlatforms":["Windows"],"tags":["Outlook Social Connector","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\outlook\\socialconnector","registrySubPath":"contactsyncinterval","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Setimportance","uniqueId":3268,"displayName":"Set importance","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Setimportance;L_Setimportance","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value for the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["When sending a message","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Setimportance;L_Setimportance","uniqueId":3267,"displayName":"Set importance","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"High","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Normal","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Low","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":2,"description":"Sets the value for the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["When sending a message","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"importance","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SetMaximumNumberOfExchangeAccounts","uniqueId":3619,"displayName":"Set maximum number of Exchange accounts per profile","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SetMaximumNumberOfExchangeAccounts;L_SetMaximumNumberOfExchangeAccountsSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to set the maximum number of Exchange accounts allowed per Outlook profile.\n\nIf you enable this policy setting, you will be able to set the maximum number of Exchange accounts allowed per Outlook profile.\n\nIf you disable or do not configure this policy setting, the default maximum number of Exchange accounts allowed per Outlook profile is 10.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SetMaximumNumberOfExchangeAccounts;L_SetMaximumNumberOfExchangeAccountsSpinID","uniqueId":3618,"displayName":"Number of Accounts:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":"undefined"},"dataType":"Integer"},"defaultValue":"10","description":"This policy setting allows you to set the maximum number of Exchange accounts allowed per Outlook profile.\n\nIf you enable this policy setting, you will be able to set the maximum number of Exchange accounts allowed per Outlook profile.\n\nIf you disable or do not configure this policy setting, the default maximum number of Exchange accounts allowed per Outlook profile is 10.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\exchange","registrySubPath":"maxnumexchange","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Setsensitivity","uniqueId":3270,"displayName":"Set sensitivity","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Setsensitivity;L_Setsensitivity","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value for the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["When sending a message","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Setsensitivity;L_Setsensitivity","uniqueId":3269,"displayName":"Set sensitivity","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Normal","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Personal","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Private","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Confidential","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the value for the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["When sending a message","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"sensitivity","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SetTrustedAddins;L_ListOfTrustedAddins","uniqueId":3491,"displayName":"List of trusted add-ins and hashes","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"This policy setting can be used to specify a list of trusted add-ins that can be run without being restricted by the security measures in Outlook.\n\nIf you enable this policy setting, a list of trusted add-ins and hashes is made available that you can modify by adding and removing entries. The list is empty by default. To create a new entry, enter a DLL file name in the ''Value Name'' column and the hash result in the ''Value'' column. \n\nIf you disable or do not configure this policy setting, the list of trusted add-ins is empty and unused, so the recommended EC and SSLF settings do not create any usability issues. However, users who rely on add-ins that access the Outlook object model might be repeatedly prompted unless administrators enable this setting and add the add-ins to the list.\n\nNote - You can also configure Exchange Security Form settings by enabling the ''Outlook Security Mode'' setting in User Configuration\\Administrative Templates\\Microsoft Outlook 2016\\Security\\Security Form Settings\\Microsoft Outlook 2016 Security and selecting ''Use Outlook Security Group Policy'' from the drop-down list.","supportedPlatforms":["Windows"],"tags":["Trusted Add-ins","Programmatic Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security\\trustedaddins","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_SetTrustedAddins","uniqueId":3492,"displayName":"Configure trusted add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SetTrustedAddins;L_ListOfTrustedAddins","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting can be used to specify a list of trusted add-ins that can be run without being restricted by the security measures in Outlook.\n\nIf you enable this policy setting, a list of trusted add-ins and hashes is made available that you can modify by adding and removing entries. The list is empty by default. To create a new entry, enter a DLL file name in the ''Value Name'' column and the hash result in the ''Value'' column. \n\nIf you disable or do not configure this policy setting, the list of trusted add-ins is empty and unused, so the recommended EC and SSLF settings do not create any usability issues. However, users who rely on add-ins that access the Outlook object model might be repeatedly prompted unless administrators enable this setting and add the add-ins to the list.\n\nNote - You can also configure Exchange Security Form settings by enabling the ''Outlook Security Mode'' setting in User Configuration\\Administrative Templates\\Microsoft Outlook 2016\\Security\\Security Form Settings\\Microsoft Outlook 2016 Security and selecting ''Use Outlook Security Group Policy'' from the drop-down list.","supportedPlatforms":["Windows"],"tags":["Trusted Add-ins","Programmatic Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_ShortenEventsType;L_SelecttheShortenEventsType","uniqueId":3824,"displayName":"Select the Shorten Events Type","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"None","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"None","description":"","tags":[],"dependencyGroup":null},{"value":"End_Early","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"End Early","description":"","tags":[],"dependencyGroup":null},{"value":"Start_Late","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Start Late","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"None","description":"\n        This policy setting allows you to shorten the default duration of appointments and meetings by a specified number of minutes. If you enable this policy setting, you can choose between the following options: End Early, Start Late, None.\n        If you select End Early, meetings and appointments will end early by the specified number of minutes. \n        If you select Start Late, meetings and appointments will start late by the specified number of minutes. \n        If you select None, the default meeting duration will not be shortened. \n        In all cases, the settings for this feature will be disabled in the Outlook Options dialog. \n        If you don’t configure this policy setting, users can modify these settings by going to File > Options > Calendar.\n\n        Note: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"shortenevents","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_ShortenEventsType","uniqueId":3825,"displayName":"Shorten appointments and meetings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_ShortenEventsType;L_SelecttheShortenEventsType","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"\n        This policy setting allows you to shorten the default duration of appointments and meetings by a specified number of minutes. If you enable this policy setting, you can choose between the following options: End Early, Start Late, None.\n        If you select End Early, meetings and appointments will end early by the specified number of minutes. \n        If you select Start Late, meetings and appointments will start late by the specified number of minutes. \n        If you select None, the default meeting duration will not be shortened. \n        In all cases, the settings for this feature will be disabled in the Outlook Options dialog. \n        If you don’t configure this policy setting, users can modify these settings by going to File > Options > Calendar.\n\n        Note: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_ShowContactslinkingcontrolsonallForms","uniqueId":3362,"displayName":"Show Contacts linking controls on all Forms","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, Tasks, Appointments, Journal Entries, and Contacts hide the controls in the Outlook user interface used for linking related contacts. When you enable this setting, the linking controls appear in Outlook. You might choose to enable this setting if your users rely on contact linking - for example, to track partners who attend appointments together or to track ways in which contacts are related to each other.","supportedPlatforms":["Windows"],"tags":["Contact Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"showcontactfieldobsolete","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ShowOLEPackageObj","uniqueId":3461,"displayName":"Display OLE package objects","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, OLE package objects are not displayed in e-mail messages. You can change this behavior so that the package appears in the body of the e-mail message as an icon that represents an embedded or linked OLE object. When users double-click the icon representing the package, the program used to create the object either plays the object or opens and displays it. Be aware that  the icon for OLE package objects can be easily changed and used to disguise malicious files.\n\nTo set Exchange Security Form settings by using Group Policy, note that this policy setting only applies if the \"Outlook Security Mode\" policy setting under \"Microsoft Outlook 2016\\Security\\Security Form Settings\" is configured to \"Use Outlook Security Group Policy.\"","supportedPlatforms":["Windows"],"tags":["Attachment Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"showolepackageobj","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_ShowOutlookLoopComponentsForSupportedApps","uniqueId":3862,"displayName":"Show Outlook Loop components for supported apps.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls whether Outlook displays Loop components that are supported by installed apps without requiring users to explicitly choose to load them.\n\nIf you enable this policy setting, Outlook will automatically display Loop components in emails. This applies to all messages or specifically to messages that originate within the recipient's local tenant or organization. This might involve contacting servers used by the installed apps to retrieve Loop components.\n\nIf you disable this policy setting, Outlook will not load content from external servers automatically, unless the sender is included in the Safe Senders list. Recipients will have the option to manually load Loop components from untrusted senders on a message-by-message basis. \n\nIf you do not set this policy setting, Outlook will default to the “enabled\" setting.\n\nNote: Loop components included in messages located in the Junk Mail folder will not load automatically, regardless of the policy setting specified. Loop components will only be shown for apps that are installed, ensuring security and a tailored experience in Outlook.","supportedPlatforms":["Windows","Web"],"tags":["Trust Center","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"showoutlookloopcomponentsforsupportedapps","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Signallemailmessages","uniqueId":3519,"displayName":"Sign all e-mail messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook requires digital signatures on all outgoing e-mail messages.\n\nIf you enable this policy setting, Outlook requires all outgoing messages to be digitally signed before being sent.\n\nIf you disable or do not configure this policy setting, Outlook does not require outgoing messages to have digital signatures.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"alwayssign","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SignatureWarning","uniqueId":3527,"displayName":"Signature Warning","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SignatureWarning;L_signaturewarning30","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls how Outlook warns users about messages with invalid digital signatures.\n\nIf you enable this policy setting, you can choose from three options for controlling how Outlook users are warned about invalid signatures:\n\n- Let user decide if they want to be warned. This option enforces the default configuration.\n- Always warn about invalid signatures.\n- Never warn about invalid signatures.\n\nIf you disable or do not configure this policy setting, if users open e-mail messages that include invalid digital signatures, Outlook displays a warning dialog. Users can decide whether they want to be warned about invalid signatures in the future.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SignatureWarning;L_signaturewarning30","uniqueId":3526,"displayName":"Signature Warning","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Let user decide if they want to be warned","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Always warn about invalid signatures","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Never warn about invalid signatures","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how Outlook warns users about messages with invalid digital signatures.\n\nIf you enable this policy setting, you can choose from three options for controlling how Outlook users are warned about invalid signatures:\n\n- Let user decide if they want to be warned. This option enforces the default configuration.\n- Always warn about invalid signatures.\n- Never warn about invalid signatures.\n\nIf you disable or do not configure this policy setting, if users open e-mail messages that include invalid digital signatures, Outlook displays a warning dialog. Users can decide whether they want to be warned about invalid signatures in the future.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"warnaboutinvalid","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SimpleMapiNameResolve","uniqueId":3488,"displayName":"Configure Simple MAPI name resolution prompt","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SimpleMapiNameResolve;L_SimpleMapi_Setting","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify what occurs when a program attempts to gain access to an Address Book, using Simple MAPI.\n\nIf you enable this policy setting, you can choose whether Outlook always allows access to the Address Book, always disallows access to the Address Book, or prompts the user to specify whether to allow or disallow access to the Address Book.\n\nIf you disable or do not configure this policy setting, Outlook prompts the user to specify whether to allow or disallow access to the Address Book.","supportedPlatforms":["Windows"],"tags":["Programmatic Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SimpleMapiNameResolve;L_SimpleMapi_Setting","uniqueId":3487,"displayName":"Guard Behavior:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt User","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically Approve","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically Deny","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This policy setting allows you to specify what occurs when a program attempts to gain access to an Address Book, using Simple MAPI.\n\nIf you enable this policy setting, you can choose whether Outlook always allows access to the Address Book, always disallows access to the Address Book, or prompts the user to specify whether to allow or disallow access to the Address Book.\n\nIf you disable or do not configure this policy setting, Outlook prompts the user to specify whether to allow or disallow access to the Address Book.","supportedPlatforms":["Windows"],"tags":["Programmatic Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"promptsimplemapinameresolve","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SimpleMapiOpenMessage","uniqueId":3490,"displayName":"Configure Simple MAPI message opening prompt","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SimpleMapiOpenMessage;L_SimpleMapi_Setting","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify what occurs when a program attempts to gain access to a recipient field, such as the “To” field, using Simple MAPI.\n\nIf you enable this policy setting, you can choose whether Outlook always allows access to the recipient field, always disallows access to the recipient field, or prompt users to specify whether to allow or disallow access to the recipient field.\n\nIf you disable or do not configure this policy setting, Outlook prompts users to specify whether to allow or disallow access to the Address Book.","supportedPlatforms":["Windows"],"tags":["Programmatic Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SimpleMapiOpenMessage;L_SimpleMapi_Setting","uniqueId":3489,"displayName":"Guard Behavior:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt User","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically Approve","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically Deny","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This policy setting allows you to specify what occurs when a program attempts to gain access to a recipient field, such as the “To” field, using Simple MAPI.\n\nIf you enable this policy setting, you can choose whether Outlook always allows access to the recipient field, always disallows access to the recipient field, or prompt users to specify whether to allow or disallow access to the recipient field.\n\nIf you disable or do not configure this policy setting, Outlook prompts users to specify whether to allow or disallow access to the Address Book.","supportedPlatforms":["Windows"],"tags":["Programmatic Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"promptsimplemapiopenmessage","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SimpleMapiSend","uniqueId":3486,"displayName":"Configure Simple MAPI sending prompt","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SimpleMapiSend;L_SimpleMapi_Setting","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify what occurs when a program attempts to send mail programmatically, using Simple MAPI.\n\nIf you enable this policy setting, you can choose whether Outlook always allows sending mail, always disables sending mail, or prompts users to specify whether to allow or disallow sending mail.\n\nIf you disable or do not configure this policy setting, Outlook prompts users to specify whether to allow or disallow sending the mail.","supportedPlatforms":["Windows"],"tags":["Programmatic Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SimpleMapiSend;L_SimpleMapi_Setting","uniqueId":3485,"displayName":"Guard Behavior:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt User","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically Approve","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically Deny","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This policy setting allows you to specify what occurs when a program attempts to send mail programmatically, using Simple MAPI.\n\nIf you enable this policy setting, you can choose whether Outlook always allows sending mail, always disables sending mail, or prompts users to specify whether to allow or disallow sending mail.\n\nIf you disable or do not configure this policy setting, Outlook prompts users to specify whether to allow or disallow sending the mail.","supportedPlatforms":["Windows"],"tags":["Programmatic Security","Security Form Settings","Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"promptsimplemapisend","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SMimeDisableDataUpload","uniqueId":3868,"displayName":"Block processing of S/MIME encrypted messages by certain connected experiences","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"\nThis policy controls whether certain connected experiences that analyze your content can process email messages with S/MIME encryption.\n\nIf you enable this policy setting, certain connected experiences that analyze your content can’t process email messages with S/MIME encryption. This means connected experiences such as the following won’t be available:\n\n-\tSpelling and grammar check (Editor)\n-\tSuggested replies\n-\tAutomatically apply or recommend sensitivity labels\n-\tMicrosoft Purview Data Loss Prevention policy tips\n\nFor more information about which connected experiences are affected, see https://go.microsoft.com/fwlink/p/?linkid=2268773.\n\nIf you disable or don’t configure this policy setting, all connected experiences that analyze your content can process email messages with S/MIME encryption.\n\nNote: This policy setting only applies to Microsoft 365 Apps for enterprise.\n      ","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\privacy","registrySubPath":"smimedisabledataupload","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SMIMEinteroperabilitywithexternalclients;L_BehaviorforhandlingSMIMEmessages","uniqueId":3507,"displayName":"Behavior for handling S/MIME messages:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Handle internally","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Handle externally","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Handle if possible","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls whether Outlook decodes encrypted messages itself or passes them to an external program for processing.\n\nIf you enable this policy setting, you can choose from three options for configuring external S/MIME clients:\n\n- Handle internally. Outlook decrypts all S/MIME messages itself.\n- Handle externally. Outlook hands all S/MIME messages off to the configured external program.\n- Handle if possible. Outlook attempts to decrypt all S/MIME messages itself. If it cannot decrypt a message, Outlook hands the message off to the configured external program. This option is the default configuration.\n\nIf you disable or do not configure this policy setting, the behavior is the equivalent of selecting Enabled – Handle if possible.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"externalsmime","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SMIMEinteroperabilitywithexternalclients","uniqueId":3508,"displayName":"S/MIME interoperability with external clients:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SMIMEinteroperabilitywithexternalclients;L_BehaviorforhandlingSMIMEmessages","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls whether Outlook decodes encrypted messages itself or passes them to an external program for processing.\n\nIf you enable this policy setting, you can choose from three options for configuring external S/MIME clients:\n\n- Handle internally. Outlook decrypts all S/MIME messages itself.\n- Handle externally. Outlook hands all S/MIME messages off to the configured external program.\n- Handle if possible. Outlook attempts to decrypt all S/MIME messages itself. If it cannot decrypt a message, Outlook hands the message off to the configured external program. This option is the default configuration.\n\nIf you disable or do not configure this policy setting, the behavior is the equivalent of selecting Enabled – Handle if possible.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SMIMEreceiptrequests;L_HandlemessageswithSMIMEreceiptrequestsinthefollowingmanner","uniqueId":3528,"displayName":"Handle messages with S/MIME receipt requests in the following manner:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open message if receipt can't be sent","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Don't open message if receipt can't be sent","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Always prompt before sending receipt","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Never send S/MIME receipts","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls how Outlook handles S/MIME receipt requests.\n\nIf you enable this policy setting, you can choose from four options for handling S/MIME receipt requests in Outlook:\n\n- Open message if receipt can't be sent\n- Don't open message if receipt can't be sent\n- Always prompt before sending receipt\n- Never send S/MIME receipts\n\nIf you disable or do not configure this policy setting, when users open messages with attached receipt requests, Outlook prompts them to decide whether to send a receipt to the sender with information about the identity of the user who opened the message and the time it was opened. If Outlook cannot send the receipt, the user is still allowed to open the message.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"respondtoreceiptrequests","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SMIMEreceiptrequests","uniqueId":3529,"displayName":"S/MIME receipt requests behavior","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SMIMEreceiptrequests;L_HandlemessageswithSMIMEreceiptrequestsinthefollowingmanner","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls how Outlook handles S/MIME receipt requests.\n\nIf you enable this policy setting, you can choose from four options for handling S/MIME receipt requests in Outlook:\n\n- Open message if receipt can't be sent\n- Don't open message if receipt can't be sent\n- Always prompt before sending receipt\n- Never send S/MIME receipts\n\nIf you disable or do not configure this policy setting, when users open messages with attached receipt requests, Outlook prompts them to decide whether to send a receipt to the sender with information about the identity of the user who opened the message and the time it was opened. If Outlook cannot send the receipt, the user is still allowed to open the message.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SMIMEUseIssuerSerialNumber","uniqueId":3516,"displayName":"Use UserIssuerSerialNumber","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether Outlook uses IssuerSerialNumber as the SignerIdentifier, which enables third-party email client software applications to read encrypted Outlook email messages. For more information about Cryptographic Message Syntax, refer to the RFC 5652 specification.\n\nIf you enable or do not configure this policy setting, Outlook uses the IssuerSerialNumber as the SignerIdentifier.\n\nIf you disable this policy setting, Outlook uses SubjectKeyIdentifier for the SignerIdentifier, which might prevent third-party email client software applications from reading encrypted Outlook email messages.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"useissuerserialnumber","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SortFoldersAlphabetically","uniqueId":3422,"displayName":"Sort folders alphabetically","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can rearrange their folders in Outlook.\n\nIf you enable this policy setting, users cannot rearrange their folders. The folders are displayed alphabetically.\n\nIf you disable this policy setting, users can rearrange their folders, but are not able to turn automatic alphabetical sorting back on from the Ribbon. \n\nIf you do not configure this policy setting, users can rearrange their folders, and turn automatic alphabetical sorting back on from the Ribbon.","supportedPlatforms":["Windows"],"tags":["Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"sortfoldersalphabetically","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SpecifyActivityFeedSynchronizationInterval","uniqueId":3782,"displayName":"Specify activity feed synchronization interval","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SpecifyActivityFeedSynchronizationInterval;L_SpecifyActivityFeedSynchronizationIntervalSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the minimum interval that Office waits before requesting activity feed information from social networks for a given contact.\n\nIf you enable this policy setting, Office waits for at least the specified interval before requesting a new activity feed for each contact.\n\nIf you disable or do not configure this policy setting, Office waits for at least the default interval (60 minutes) before requesting a new activity feed for each contact.","supportedPlatforms":["Windows"],"tags":["Outlook Social Connector","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SpecifyActivityFeedSynchronizationInterval;L_SpecifyActivityFeedSynchronizationIntervalSpinID","uniqueId":3781,"displayName":"Synchronization interval (in minutes):","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":10080},"dataType":"Integer"},"defaultValue":"60","description":"This policy setting specifies the minimum interval that Office waits before requesting activity feed information from social networks for a given contact.\n\nIf you enable this policy setting, Office waits for at least the specified interval before requesting a new activity feed for each contact.\n\nIf you disable or do not configure this policy setting, Office waits for at least the default interval (60 minutes) before requesting a new activity feed for each contact.","supportedPlatforms":["Windows"],"tags":["Outlook Social Connector","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\outlook\\socialconnector","registrySubPath":"activitysyncinterval","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SpecifydefaultlocationofDesktopAlert;L_Corner03","uniqueId":3245,"displayName":"Corner (0-3)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":3},"dataType":"Integer"},"description":"You can change the default location of the Desktop Alert. In the Corner field, select a number corresponding to a quadrant of the user's screen: 0 = upper left, 1 = upper right, 2 = lower left, 3 = lower right (the default). In the XOffset field, enter a number representing the horizontal distance from the corner you've specified (the default is 44). In the YOffset field, enter a number representing the vertical distance from the corner you've specified (the default is 42).","supportedPlatforms":["Windows"],"tags":["Desktop Alert","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\desktopalerts","registrySubPath":"corner","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SpecifydefaultlocationofDesktopAlert","uniqueId":3248,"displayName":"Specify default location of Desktop Alert","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SpecifydefaultlocationofDesktopAlert;L_Corner03","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_SpecifydefaultlocationofDesktopAlert;L_XOffsetdefault44","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_SpecifydefaultlocationofDesktopAlert;L_YOffsetdefault42","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"You can change the default location of the Desktop Alert. In the Corner field, select a number corresponding to a quadrant of the user's screen: 0 = upper left, 1 = upper right, 2 = lower left, 3 = lower right (the default). In the XOffset field, enter a number representing the horizontal distance from the corner you've specified (the default is 44). In the YOffset field, enter a number representing the vertical distance from the corner you've specified (the default is 42).","supportedPlatforms":["Windows"],"tags":["Desktop Alert","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SpecifydefaultlocationofDesktopAlert;L_XOffsetdefault44","uniqueId":3246,"displayName":"XOffset (default 44):","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"You can change the default location of the Desktop Alert. In the Corner field, select a number corresponding to a quadrant of the user's screen: 0 = upper left, 1 = upper right, 2 = lower left, 3 = lower right (the default). In the XOffset field, enter a number representing the horizontal distance from the corner you've specified (the default is 44). In the YOffset field, enter a number representing the vertical distance from the corner you've specified (the default is 42).","supportedPlatforms":["Windows"],"tags":["Desktop Alert","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\desktopalerts","registrySubPath":"xoffset","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SpecifydefaultlocationofDesktopAlert;L_YOffsetdefault42","uniqueId":3247,"displayName":"YOffset (default 42):","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"You can change the default location of the Desktop Alert. In the Corner field, select a number corresponding to a quadrant of the user's screen: 0 = upper left, 1 = upper right, 2 = lower left, 3 = lower right (the default). In the XOffset field, enter a number representing the horizontal distance from the corner you've specified (the default is 44). In the YOffset field, enter a number representing the vertical distance from the corner you've specified (the default is 42).","supportedPlatforms":["Windows"],"tags":["Desktop Alert","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\desktopalerts","registrySubPath":"yoffset","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SpecifyDelayBeforeSendingPeopleSearchRequest","uniqueId":3733,"displayName":"Specify delay before sending people search request","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SpecifyDelayBeforeSendingPeopleSearchRequest;L_SpecifyDelayBeforeSendingPeopleSearchRequestSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy is used to set the delay for sending people search requests from the Find a Contact box in Outlook and the Related People section that appears in the Backstage view (Info tab) of Office applications.\n\nIf you enable this policy setting, you can specify the delay in milliseconds between when the user stops (or pauses) typing in the search box and when the application sends a search request.\n\nIf you disable or do not configure this policy setting, the default delay is 200 milliseconds (0.20 seconds).","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SpecifyDelayBeforeSendingPeopleSearchRequest;L_SpecifyDelayBeforeSendingPeopleSearchRequestSpinID","uniqueId":3732,"displayName":"in milliseconds","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":100000000},"dataType":"Integer"},"defaultValue":"200","description":"This policy is used to set the delay for sending people search requests from the Find a Contact box in Outlook and the Related People section that appears in the Backstage view (Info tab) of Office applications.\n\nIf you enable this policy setting, you can specify the delay in milliseconds between when the user stops (or pauses) typing in the search box and when the application sends a search request.\n\nIf you disable or do not configure this policy setting, the default delay is 200 milliseconds (0.20 seconds).","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\im","registrySubPath":"presencecontactfastsearchdelay","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SpecifydurationofDesktopAlertbeforefadeinmillisec;L_MillisecDefault4000","uniqueId":3235,"displayName":"Millisec (Default 4000):","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":1000000000},"dataType":"Integer"},"description":"Specify duration of Desktop Alert before fade (in milliseconds)","supportedPlatforms":["Windows"],"tags":["Desktop Alert","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\desktopalerts","registrySubPath":"timeon","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SpecifydurationofDesktopAlertbeforefadeinmillisec","uniqueId":3236,"displayName":"Specify duration of Desktop Alert before fade (in milliseconds)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SpecifydurationofDesktopAlertbeforefadeinmillisec;L_MillisecDefault4000","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specify duration of Desktop Alert before fade (in milliseconds)","supportedPlatforms":["Windows"],"tags":["Desktop Alert","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SpecifydurationofDesktopAlertonmouseoverinmillisec;L_millisec1","uniqueId":3237,"displayName":"Millisec:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":250000},"dataType":"Integer"},"description":"Specify duration of Desktop Alert on mouse over (in milliseconds)","supportedPlatforms":["Windows"],"tags":["Desktop Alert","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\desktopalerts","registrySubPath":"timefocus","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SpecifydurationofDesktopAlertonmouseoverinmillisec","uniqueId":3238,"displayName":"Specify duration of Desktop Alert on mouse over (in milliseconds)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SpecifydurationofDesktopAlertonmouseoverinmillisec;L_millisec1","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specify duration of Desktop Alert on mouse over (in milliseconds)","supportedPlatforms":["Windows"],"tags":["Desktop Alert","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Specifydurationoffadeininmillisec;L_Millisec","uniqueId":3233,"displayName":"Millisec:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":25000},"dataType":"Integer"},"description":"Specify duration of fade in (in milliseconds)","supportedPlatforms":["Windows"],"tags":["Desktop Alert","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\desktopalerts","registrySubPath":"timein","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Specifydurationoffadeininmillisec","uniqueId":3234,"displayName":"Specify duration of fade in (in milliseconds)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Specifydurationoffadeininmillisec;L_Millisec","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specify duration of fade in (in milliseconds)","supportedPlatforms":["Windows"],"tags":["Desktop Alert","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Specifydurationoffadeoutinmillisec;L_millisec2","uniqueId":3239,"displayName":"Millisec:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":25000},"dataType":"Integer"},"description":"Specify duration of fade out (in milliseconds)","supportedPlatforms":["Windows"],"tags":["Desktop Alert","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\desktopalerts","registrySubPath":"timeout","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Specifydurationoffadeoutinmillisec","uniqueId":3240,"displayName":"Specify duration of fade out (in milliseconds)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Specifydurationoffadeoutinmillisec;L_millisec2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specify duration of fade out (in milliseconds)","supportedPlatforms":["Windows"],"tags":["Desktop Alert","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SpecifyListOfSocialNetworkProvidersToLoad","uniqueId":3794,"displayName":"Specify list of social network providers to load","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SpecifyListOfSocialNetworkProvidersToLoad;L_SpecifyListOfSocialNetworkProvidersToLoadID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting determines the list of social network providers that are loaded by the Outlook Social Connector.\n\nIf you enable this policy setting, you may enter a list of provider progIDs of social network providers that will be loaded by the Outlook Social Connector.  This list needs to be semi-colon delimited.  Note that if you enable this policy setting, only social network providers that are on this list will be loaded by the Outlook Social Connector.  No other social network providers will be loaded.\n\nIf you disable or you do not configure this policy setting, the Outlook Social Connector can load any provider specified by the user.","supportedPlatforms":["Windows"],"tags":["Outlook Social Connector","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\outlook\\socialconnector","registrySubPath":"providersecuritymode","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SpecifyListOfSocialNetworkProvidersToLoad;L_SpecifyListOfSocialNetworkProvidersToLoadID","uniqueId":3793,"displayName":"Separate ProgIDs with semi-colons","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting determines the list of social network providers that are loaded by the Outlook Social Connector.\n\nIf you enable this policy setting, you may enter a list of provider progIDs of social network providers that will be loaded by the Outlook Social Connector.  This list needs to be semi-colon delimited.  Note that if you enable this policy setting, only social network providers that are on this list will be loaded by the Outlook Social Connector.  No other social network providers will be loaded.\n\nIf you disable or you do not configure this policy setting, the Outlook Social Connector can load any provider specified by the user.","supportedPlatforms":["Windows"],"tags":["Outlook Social Connector","Microsoft Outlook 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\outlook\\socialconnector","registrySubPath":"trustedproviderslist","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_SpecifyMaxCertLengthAllowedtoStamp","uniqueId":3861,"displayName":"Set Maximum Certificate Size Limit for Signed Emails in Reply Scenarios.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SpecifyMaxCertLengthAllowedtoStamp;L_SpecifyMaxCertLengthAllowedtoStampSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls the maximum limit for the size of the stored certificate in Exchange server when replying to a digitally signed email using Outlook.\n\nIf you enable this policy setting, you can configure the maximum limit for the size of the stored certificate, up to a maximum of 16384 kb. This helps to avoid issues where a reply to a digitally signed email may not be delivered or saved in the sent items due to large certificate sizes of the original sender.\n\nBy disabling this policy setting, the maximum limit will be the default set at 12921 kb, limiting the ability of administrators to adjust the maximum size of the stored certificate.\n\nIf you do not set the policy setting, it is treated as enabled and the default maximum limit for the size of the stored certificate is set at 12921 kb.\t\n      ","supportedPlatforms":["Windows"],"tags":["Compose Messages","Mail","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SpecifyMaxCertLengthAllowedtoStamp;L_SpecifyMaxCertLengthAllowedtoStampSpinID","uniqueId":3860,"displayName":"In bytes:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":16384},"dataType":"Integer"},"defaultValue":"12921","description":"This policy setting controls the maximum limit for the size of the stored certificate in Exchange server when replying to a digitally signed email using Outlook.\n\nIf you enable this policy setting, you can configure the maximum limit for the size of the stored certificate, up to a maximum of 16384 kb. This helps to avoid issues where a reply to a digitally signed email may not be delivered or saved in the sent items due to large certificate sizes of the original sender.\n\nBy disabling this policy setting, the maximum limit will be the default set at 12921 kb, limiting the ability of administrators to adjust the maximum size of the stored certificate.\n\nIf you do not set the policy setting, it is treated as enabled and the default maximum limit for the size of the stored certificate is set at 12921 kb.\t\n      ","supportedPlatforms":["Windows"],"tags":["Compose Messages","Mail","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"maxcertlengthtostamp","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SpecifyMaxGroupsSupported","uniqueId":3856,"displayName":"Maximum Groups Supported","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SpecifyMaxGroupsSupported;L_SpecifyMaxGroupsSupportedID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls the maximum number of groups that are accessible through the Navigation Pane in Outlook for Windows.\n\nIf you enable this policy setting, only the number of groups set in the Groups Count will be shown in the Navigation Pane. \n\nIf you don’t enable this policy setting, the maximum number of groups displayed defaults to 1000.\n      ","supportedPlatforms":["Windows"],"tags":["Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SpecifyMaxGroupsSupported;L_SpecifyMaxGroupsSupportedID","uniqueId":3855,"displayName":"Groups Count:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":100,"maximum":1000},"dataType":"Integer"},"defaultValue":"100","description":"This policy setting controls the maximum number of groups that are accessible through the Navigation Pane in Outlook for Windows.\n\nIf you enable this policy setting, only the number of groups set in the Groups Count will be shown in the Navigation Pane. \n\nIf you don’t enable this policy setting, the maximum number of groups displayed defaults to 1000.\n      ","supportedPlatforms":["Windows"],"tags":["Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\groups","registrySubPath":"maxgroupssupported","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SpecifyOfflineAddressBookPath","uniqueId":3575,"displayName":"Specify Offline Address Book path","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SpecifyOfflineAddressBookPath;L_SpecifyOfflineAddressBookPathID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a path to save the Offline Address Book.  This policy setting will apply to all Microsoft Exchange accounts.\n\nIf you enable this policy setting, you may specify a path to save the Offline Address Book.\n\nIf you disable or do not configure this policy setting, Outlook will save the Offline Address Book in %LOCALAPPDATA%\\Microsoft\\Outlook.","supportedPlatforms":["Windows"],"tags":["E-mail","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SpecifyOfflineAddressBookPath;L_SpecifyOfflineAddressBookPathID","uniqueId":3574,"displayName":"Offline Address Book path:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to specify a path to save the Offline Address Book.  This policy setting will apply to all Microsoft Exchange accounts.\n\nIf you enable this policy setting, you may specify a path to save the Offline Address Book.\n\nIf you disable or do not configure this policy setting, Outlook will save the Offline Address Book in %LOCALAPPDATA%\\Microsoft\\Outlook.","supportedPlatforms":["Windows"],"tags":["E-mail","Account Settings","Microsoft Outlook 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\cached mode","registrySubPath":"specifyofflineaddressbookpath","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_Specifyopacityatstartoffadein","uniqueId":3244,"displayName":"Specify opacity at start of fade in","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Specifyopacityatstartoffadein;L_specifyopacityatstartoffadein3","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specify opacity at start of fade in","supportedPlatforms":["Windows"],"tags":["Desktop Alert","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Specifyopacityatstartoffadein;L_specifyopacityatstartoffadein3","uniqueId":3243,"displayName":"Specify opacity at start of fade in","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":255},"dataType":"Integer"},"description":"Specify opacity at start of fade in","supportedPlatforms":["Windows"],"tags":["Desktop Alert","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\desktopalerts","registrySubPath":"firstopacity","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SpecifyopacityofDesktopAlert;L_OpacityAlphaLevel","uniqueId":3241,"displayName":"Opacity (Alpha Level):","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":255},"dataType":"Integer"},"description":"Specify opacity of Desktop Alert","supportedPlatforms":["Windows"],"tags":["Desktop Alert","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\desktopalerts","registrySubPath":"opacity","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SpecifyopacityofDesktopAlert","uniqueId":3242,"displayName":"Specify opacity of Desktop Alert","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SpecifyopacityofDesktopAlert;L_OpacityAlphaLevel","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specify opacity of Desktop Alert","supportedPlatforms":["Windows"],"tags":["Desktop Alert","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SpecifyOutlookPeopleSearchTimeout","uniqueId":3735,"displayName":"Set the time-out interval for Outlook people search","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SpecifyOutlookPeopleSearchTimeout;L_SpecifyOutlookPeopleSearchTimeoutSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls the time-out interval of Outlook people search. Outlook returns as many people search results as possible before the time-out interval lapses. If the search results are incomplete, Outlook displays a message at the bottom of the results list.\n\nIf you enable this policy setting, you can specify the time-out interval in milliseconds.\n\nIf you disable or do not configure this policy setting, the time-out interval is 60,000 milliseconds (60 seconds).","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SpecifyOutlookPeopleSearchTimeout;L_SpecifyOutlookPeopleSearchTimeoutSpinID","uniqueId":3734,"displayName":"in milliseconds","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":3000,"maximum":100000000},"dataType":"Integer"},"defaultValue":"60000","description":"This policy setting controls the time-out interval of Outlook people search. Outlook returns as many people search results as possible before the time-out interval lapses. If the search results are incomplete, Outlook displays a message at the bottom of the results list.\n\nIf you enable this policy setting, you can specify the time-out interval in milliseconds.\n\nIf you disable or do not configure this policy setting, the time-out interval is 60,000 milliseconds (60 seconds).","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\im","registrySubPath":"presencecontactfastsearchtimeout","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SpecifypathtoBlockedSenderslist;L_SpecifyfullpathandfilenametoBlockedSenderslist","uniqueId":3382,"displayName":"Specify full path and filename to Blocked Senders list","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specify a text file containing a list of e-mail addresses to append to or overwrite the Blocked Senders list (depending on the policy \"Overwrite or Append Junk Mail Import List\").","supportedPlatforms":["Windows"],"tags":["Junk E-mail","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"junkmailblockedsendersfile","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_SpecifypathtoBlockedSenderslist","uniqueId":3383,"displayName":"Specify path to Blocked Senders list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SpecifypathtoBlockedSenderslist;L_SpecifyfullpathandfilenametoBlockedSenderslist","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specify a text file containing a list of e-mail addresses to append to or overwrite the Blocked Senders list (depending on the policy \"Overwrite or Append Junk Mail Import List\").","supportedPlatforms":["Windows"],"tags":["Junk E-mail","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SpecifypathtoSafeRecipientslist;L_SpecifyfullpathandfilenametoSafeRecipientslist","uniqueId":3380,"displayName":"Specify full path and filename to Safe Recipients list","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specify a text file containing a list of e-mail addresses to append to or overwrite the Safe Recipients list (depending on the policy \"Overwrite or Append Junk Mail Import List\").","supportedPlatforms":["Windows"],"tags":["Junk E-mail","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"junkmailsaferecipientsfile","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_SpecifypathtoSafeRecipientslist","uniqueId":3381,"displayName":"Specify path to Safe Recipients list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SpecifypathtoSafeRecipientslist;L_SpecifyfullpathandfilenametoSafeRecipientslist","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specify a text file containing a list of e-mail addresses to append to or overwrite the Safe Recipients list (depending on the policy \"Overwrite or Append Junk Mail Import List\").","supportedPlatforms":["Windows"],"tags":["Junk E-mail","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SpecifypathtoSafeSenderslist;L_SpecifyfullpathandfilenametoSafeSenderslist","uniqueId":3378,"displayName":"Specify full path and filename to Safe Senders list","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specify a text file containing a list of e-mail addresses to append to or overwrite the Safe Senders list (depending on the policy \"Overwrite or Append Junk Mail Import List\").","supportedPlatforms":["Windows"],"tags":["Junk E-mail","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"junkmailsafesendersfile","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_SpecifypathtoSafeSenderslist","uniqueId":3379,"displayName":"Specify path to Safe Senders list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SpecifypathtoSafeSenderslist;L_SpecifyfullpathandfilenametoSafeSenderslist","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specify a text file containing a list of e-mail addresses to append to or overwrite the Safe Senders list (depending on the policy \"Overwrite or Append Junk Mail Import List\").","supportedPlatforms":["Windows"],"tags":["Junk E-mail","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SpecifyWaitOnSendTimeoutForDLPEvaluation","uniqueId":3858,"displayName":"Specify wait time to evaluate sensitive content","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SpecifyWaitOnSendTimeoutForDLPEvaluation;L_SpecifyWaitOnSendTimeoutForDLPEvaluationSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting is used to define the waiting time for evaluating sensitive content in emails before a user can send them. Customize whether immediate email sending is allowed, sending is permitted after a specific wait time, or complete evaluation is required before sending. Regardless of the setting, the service will continue the evaluation in the background and take appropriate action based on the results, such as blocking delivery if necessary.\n\nIf you disable or do not configure this policy setting, emails will be sent right away without waiting for the final evaluation of the configured policies.\n\nIf you enable this policy setting, you can set a specific wait time, measured in seconds (in the range of 0-9999), before the \"Send Anyway\" button appears in the waiting dialog. This allows users to send the mail even before the policy evaluation is complete. \n\nPlease note that setting the wait time above 9999 indicates that users are not allowed to send the mail without evaluation. In such cases, the \"Send Anyway\" button will never be shown.","supportedPlatforms":["Windows"],"tags":["Compose Messages","Mail","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SpecifyWaitOnSendTimeoutForDLPEvaluation;L_SpecifyWaitOnSendTimeoutForDLPEvaluationSpinID","uniqueId":3857,"displayName":"In seconds:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":10000},"dataType":"Integer"},"defaultValue":"5","description":"This policy setting is used to define the waiting time for evaluating sensitive content in emails before a user can send them. Customize whether immediate email sending is allowed, sending is permitted after a specific wait time, or complete evaluation is required before sending. Regardless of the setting, the service will continue the evaluation in the background and take appropriate action based on the results, such as blocking delivery if necessary.\n\nIf you disable or do not configure this policy setting, emails will be sent right away without waiting for the final evaluation of the configured policies.\n\nIf you enable this policy setting, you can set a specific wait time, measured in seconds (in the range of 0-9999), before the \"Send Anyway\" button appears in the waiting dialog. This allows users to send the mail even before the policy evaluation is complete. \n\nPlease note that setting the wait time above 9999 indicates that users are not allowed to send the mail without evaluation. In such cases, the \"Send Anyway\" button will never be shown.","supportedPlatforms":["Windows"],"tags":["Compose Messages","Mail","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"dlpwaitonsendtimeout","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SpoofyEmails","uniqueId":3370,"displayName":"Hide warnings about suspicious domain names in e-mail addresses","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting hides warnings about suspicious domain names in e-mail addresses.\n\nIf you enable this policy setting, warnings about suspicious domain names in e-mail addresses will be hidden.\n\nIf you disable or do not configure this policy setting, warnings about suspicious domain names in e-mail addresses will not be hidden.\n      ","supportedPlatforms":["Windows"],"tags":["Junk E-mail","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"outlookenablespoofyemails","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_StationeryFonts;L_Stationeryfontoptions","uniqueId":3405,"displayName":"Stationery font options:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use theme's font","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use user's font on replies and forwards","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Always use user's fonts","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to choose a Stationery font option.\n\nIf you enable this policy setting, a Stationery font option from the dropdown list will be enforced.\n\nIf you disable or do not configure this policy setting, the default setting (use theme's font) will be used.","supportedPlatforms":["Windows"],"tags":["Stationery and Fonts","Mail Format","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\mailsettings","registrySubPath":"themefont","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_StationeryFonts","uniqueId":3406,"displayName":"Stationery Fonts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_StationeryFonts;L_Stationeryfontoptions","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to choose a Stationery font option.\n\nIf you enable this policy setting, a Stationery font option from the dropdown list will be enforced.\n\nIf you disable or do not configure this policy setting, the default setting (use theme's font) will be used.","supportedPlatforms":["Windows"],"tags":["Stationery and Fonts","Mail Format","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SuggestnameswhilecompletingToCcandBccfields","uniqueId":3280,"displayName":"Suggest names while completing To, Cc, and Bcc fields","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_SuggestnameswhilecompletingToCcandBccfields;L_SuggestnameswhilecompletingToCcandBccfields","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value for the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["When sending a message","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_SuggestnameswhilecompletingToCcandBccfields;L_SuggestnameswhilecompletingToCcandBccfields","uniqueId":3279,"displayName":"Suggest names while completing To, Cc, and Bcc fields","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the value for the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["When sending a message","Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"showautosug","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_SynchronizeOutlookRSSFeedswithCommonFeedList","uniqueId":3620,"displayName":"Synchronize Outlook RSS Feeds with Common Feed List","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook subscribes to the Common Feed List, which is made available to multiple RSS clients. The Common Feed List is a hierarchical set of RSS Feeds to which clients such as Outlook, the Feeds list in Internet Explorer 7, and the Feed Headlines Sidebar gadget in Windows Vista can subscribe. \n\nIf you enable this policy setting, Outlook automatically subscribes to RSS Feeds added in Internet Explorer, and Outlook RSS Feeds are synchronized with the Common Feed List so they are available in Internet Explorer. Be aware that third-party applications besides Internet Explorer can add RSS Feeds to the Common Feed List, and if you enable this setting Outlook automatically subscribes to those RSS Feeds as well. \n\nIf you disable or do not configure this policy setting, Outlook maintains its own list of RSS Feeds and does not automatically subscribe to RSS Feeds that are added to the Common Feed List.","supportedPlatforms":["Windows"],"tags":["RSS Feeds","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\rss","registrySubPath":"synctosyscfl","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Synchronizingdatainsharedfolders;L_NumberOfDays","uniqueId":3597,"displayName":"Number of days","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":"undefined"},"dataType":"Integer"},"description":"This setting controls the number of days that elapses without a user accessing an Outlook folder before Outlook stops synchronizing the folder with Exchange. For example, say this option is set to 45. User A opens User B's calendar in Outlook, and then does not click on it again for 45 days. Outlook stops synchronizing the data with Exchange and the calendar is no longer up-to-date. The local copy of the data is removed from the OST file. If User A then clicks on the  User B calendar 90 days later, Outlook synchronizes the calendar data and starts the clock again for 45 days.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\cached mode","registrySubPath":"sharedfolderageoutdays","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Synchronizingdatainsharedfolders","uniqueId":3598,"displayName":"Synchronizing data in shared folders","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Synchronizingdatainsharedfolders;L_NumberOfDays","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This setting controls the number of days that elapses without a user accessing an Outlook folder before Outlook stops synchronizing the folder with Exchange. For example, say this option is set to 45. User A opens User B's calendar in Outlook, and then does not click on it again for 45 days. Outlook stops synchronizing the data with Exchange and the calendar is no longer up-to-date. The local copy of the data is removed from the OST file. If User A then clicks on the  User B calendar 90 days later, Outlook synchronizes the calendar data and starts the clock again for 45 days.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_TasksFolderHomePage;L_showassociatedwebpage66","uniqueId":3699,"displayName":"Show associated web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in  the Home Page tab of the Tasks Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\tasks","registrySubPath":"show","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_TasksFolderHomePage","uniqueId":3702,"displayName":"Tasks Folder Home Page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_TasksFolderHomePage;L_showassociatedwebpage66","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_TasksFolderHomePage;L_urladdressofassociatedwebpage67","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_TasksFolderHomePage;L_turnoffinternetexplorersecuritychecksforthiswebpage68","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in  the Home Page tab of the Tasks Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_TasksFolderHomePage;L_turnoffinternetexplorersecuritychecksforthiswebpage68","uniqueId":3701,"displayName":"Turn off Windows Internet Explorer security checks for this web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"yes","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"no","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"no","description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in  the Home Page tab of the Tasks Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\tasks","registrySubPath":"security","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_TasksFolderHomePage;L_urladdressofassociatedwebpage67","uniqueId":3700,"displayName":"URL address of associated web page:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to modify the \"Show home page by default for this folder\" in  the Home Page tab of the Tasks Properties dialog box.\n\nIf you enable this policy setting, you will set the \"Show home page by default for this folder\" check box.  You will also be able to enter a URL, which has a maximum limit of 129 characters.\n\nIf you disable or do not configure this policy setting, the \"Show home page by default for this folder\" check box will not be checked.","supportedPlatforms":["Windows"],"tags":["Folder Home Pages for Outlook Special Folders","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\webview\\tasks","registrySubPath":"url","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_TrustEmailfromContacts","uniqueId":3374,"displayName":"Trust e-mail from contacts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Outlook analyzes e-mail from users' Contacts when filtering junk e-mail.\n\nIf you enable this policy setting, the \"Also trust E-mail from my Contacts\" check box is selected in the Safe Senders tab of the Junk E-mail Options dialog and users cannot change it. E-mail addresses in users' Contacts list are treated as safe senders for purposes of filtering junk e-mail.\n\nIf you disable this policy setting, e-mail addresses in users' Contacts list are not treated as safe senders for purposes of filtering junk email, and users cannot change this configuration.\n\nIf you do not configure this policy setting, e-mail messages that are received from people who are listed in Contacts are considered safe by the Junk E-mail Filter, but users can change this configuration.","supportedPlatforms":["Windows"],"tags":["Junk E-mail","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"junkmailtrustcontacts","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_TurnOffAutomaticSearchIndexReconciliation","uniqueId":3202,"displayName":"Turn off automatic search index reconciliation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting configures the automatic verification of the integrity of Outlook's search index every 72 hours.\n\nIf you enable this policy setting, automatic reconciliation will be turned off.\n\nIf you disable or do not configure this policy setting, Outlook will reconcile its index every 72 hours.","supportedPlatforms":["Windows"],"tags":["Search Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\search","registrySubPath":"recondisable","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_TurnOffAutoSwitchingFromHorizontalToVertical","uniqueId":3312,"displayName":"Turn off auto-switching from horizontal to vertical layout","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls auto switching of calendar layouts from horizontal to vertical.  \n\nIf you enable this policy setting, auto-switching is turned off.\n\nIf you disable or do not configure this policy setting, auto-switching is turned on.","supportedPlatforms":["Windows"],"tags":["Schedule View","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\wunderbar","registrySubPath":"enableautoswitchinghorizontaltovertical","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_TurnOffAutoSwitchingFromVerticalToHorizontalLayout","uniqueId":3311,"displayName":"Turn off auto-switching from vertical to horizontal layout","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls auto-switching of calendar layouts from vertical to horizontal.\n\nIf you enable this policy setting, auto-switching is turned off.\n\nIf you disable or do not configure this policy setting, auto-switching is turned on.","supportedPlatforms":["Windows"],"tags":["Schedule View","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\wunderbar","registrySubPath":"enableautoswitchingverticaltohorizontal","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_TurnOffContactExport","uniqueId":3361,"displayName":"Turn off contact export","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls the ability of users to export contact information from the address book.\n\nIf you enable this policy setting, the \"Add to Contacts\" menu is not configurable in the address book.\n\nIf you disable or do not configure this policy setting, the \"Add to Contacts\" menu is configurable.","supportedPlatforms":["Windows"],"tags":["Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook","registrySubPath":"disableexportingcontact","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_TurnOffHierarchicalAddressBook","uniqueId":3587,"displayName":"Turn off Hierarchical Address Book","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting turns off the Hierarchical Address Book (HAB).\n\nIf you enable this policy setting, the HAB will be turned off. \n\nIf you disable or do not configure this policy setting, the HAB will be displayed.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook","registrySubPath":"disablehab","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_TurnOffHierarchicalAddressBookDepartmentSelection","uniqueId":3585,"displayName":"Turn off Hierarchical Address Book department selection","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether departments can be picked as recipients in the Hierarchical Address Book (HAB).\n\nIf you enable this policy setting, the tree control to pick departments as recipients is turned off in the HAB.\n\nIf you disable or do not configure this policy setting, the tree control to pick departments as recipients is turned on in the HAB.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook","registrySubPath":"disablepickingdepartment","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_TurnOffHierarchicalAddressBookSearch","uniqueId":3586,"displayName":"Turn off Hierarchical Address Book search","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls entry points to search in the Hierarchical Address Book (HAB).\n\nIf you enable this policy setting, all entry points to search features in the HAB will be turned off.  \n\nIf you disable or do not configure this policy setting, all entry points to search features in the HAB will be enabled.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook","registrySubPath":"disablehabsearch","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_TurnOffLegacyGroupCalendarMigration","uniqueId":3314,"displayName":"Turn off Legacy Group Calendar migration","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls the migration of legacy Group Calendar.  \n\nIf you enable this policy setting, migration will be turned off.\n\nIf you disable or do not configure this policy setting, migration will be turned on.","supportedPlatforms":["Windows"],"tags":["Schedule View","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\wunderbar","registrySubPath":"disablelegacygroupcalendar","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_TurnOffOutlookSocialConnector","uniqueId":3779,"displayName":"Turn off Outlook Social Connector","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off the Outlook Social Connector.\n\nIf you enable this policy setting, the Outlook Social Connector is turned off.\n\nIf you disable or you do not configure this policy setting, the Outlook Social Connector is turned on.","supportedPlatforms":["Windows"],"tags":["Outlook Social Connector","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\outlook\\socialconnector","registrySubPath":"runosc","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_TurnoffRSSfeature","uniqueId":3623,"displayName":"Turn off RSS feature","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the RSS aggregation feature in Outlook is enabled. \n\nIf you enable this policy setting, the RSS aggregation feature in Outlook is disabled. \n\nIf you disable or do not configure this policy setting, users can subscribe to RSS Feeds from within Outlook and read RSS items like e-mail messages.","supportedPlatforms":["Windows"],"tags":["RSS Feeds","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\rss","registrySubPath":"disable","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_TurnoffSendandTrack","uniqueId":3283,"displayName":"Turn off Send and Track feature","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, users can flag an e-mail that they send to help them remember to follow up on it later. The flag is not sent to the recipient. By enabling this setting, this feature is turned off.","supportedPlatforms":["Windows"],"tags":["Tracking Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\flagging","registrySubPath":"disablesenderflags","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_TurnOffSharingRecommendation","uniqueId":3313,"displayName":"Turn off sharing recommendation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls the sharing recommendation feature.  \n\nIf you enable this policy setting, the recommendation will be turned off.\n\nIf you disable or do not configure this policy setting, the recommendation will be turned on.","supportedPlatforms":["Windows","Web","Android","iOS"],"tags":["Schedule View","Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Android","iOS"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"disablesharingrecommendationui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Turnoffwordwheel","uniqueId":3211,"displayName":"Do not display search results as the user types","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, search results are displayed as the user types a search query. This functionality (known as WordWheeling) can be turned off by enabling this setting.","supportedPlatforms":["Windows"],"tags":["Search Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\search","registrySubPath":"disablewordwheeling","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_TurnOnLoggingForAllConflicts","uniqueId":3428,"displayName":"Turn on logging for all conflicts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_TurnOnLoggingForAllConflicts;L_TurnOnLoggingForAllConflictsDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to create Modification Resolution logs whenever the Outlook conflict resolver runs.  \n\nIf you enable this policy setting, Outlook will create Modification Resolution logs whenever the Outlook conflict resolver runs.  By default, Modification Resolution logs are written into the Sync Issues folder whenever Outlook's conflict resolver cannot resolve a conflict.\n\nYou may select one of these options:\n- No conflicts are logged: No Modification Resolution logs are written into the Sync Issues folder whenever Outlook's conflict resolver runs. \n- All conflicts logged: Modification Resolution logs are written into the Sync Issues folder whenever Outlook's conflict resolver runs.\n- Unresolved conflicts logged only: Modification Resolution logs are written into the Sync Issues folder in Outlook when the Outlook conflict resolver cannot resolve a conflict.\n\nThis applies to all item types.\n\nIf you disable or do not configure this policy setting, no Modification Resolution logs are written when the Outlook conflict resolver runs.","supportedPlatforms":["Windows"],"tags":["Advanced","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_TurnOnLoggingForAllConflicts;L_TurnOnLoggingForAllConflictsDropID","uniqueId":3427,"displayName":"Turn on logging for all conflicts","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"No conflicts are logged (default)","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"All conflicts logged","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Unresolved conflicts logged only","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to create Modification Resolution logs whenever the Outlook conflict resolver runs.  \n\nIf you enable this policy setting, Outlook will create Modification Resolution logs whenever the Outlook conflict resolver runs.  By default, Modification Resolution logs are written into the Sync Issues folder whenever Outlook's conflict resolver cannot resolve a conflict.\n\nYou may select one of these options:\n- No conflicts are logged: No Modification Resolution logs are written into the Sync Issues folder whenever Outlook's conflict resolver runs. \n- All conflicts logged: Modification Resolution logs are written into the Sync Issues folder whenever Outlook's conflict resolver runs.\n- Unresolved conflicts logged only: Modification Resolution logs are written into the Sync Issues folder in Outlook when the Outlook conflict resolver cannot resolve a conflict.\n\nThis applies to all item types.\n\nIf you disable or do not configure this policy setting, no Modification Resolution logs are written when the Outlook conflict resolver runs.","supportedPlatforms":["Windows"],"tags":["Advanced","Other","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options","registrySubPath":"enableconflictlogging","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Turnonpurgewhenswitchingfolders","uniqueId":3629,"displayName":"Turn on purge when switching folders","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"When \"purge on switch\" is enabled, IMAP e-mail messages marked for deletion in the current folder will be permanently removed from the server when the user switches to another folder.  This setting will allow you to enable the IMAP \"purge on switch\" feature.","supportedPlatforms":["Windows"],"tags":["IMAP","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"enablepurgeonswitch","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_UpgradeOnlyTheDefaultStore","uniqueId":3746,"displayName":"Upgrade only the default store","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to specify that only the default data file is upgraded on the first boot of Outlook.\n\nIf you enable this policy setting, only the data file associated with your delivery mailbox is upgraded.\n\nIf you disable or do not configure this policy setting, all Outlook Data Files are upgraded.","supportedPlatforms":["Windows"],"tags":["PST Settings","Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\setup","registrySubPath":"upgradedefaultonly","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_URLforcustomOutlookToday;L_EntertheURLofOutlookTodayswebpagemax129chars","uniqueId":3656,"displayName":"Enter the URL of Outlook Today's web page (max 129 chars):","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specifies the URL of a custom web page to be displayed in place of Outlook Today.","supportedPlatforms":["Windows"],"tags":["Outlook Today Settings","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\today","registrySubPath":"url","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_URLforcustomOutlookToday","uniqueId":3657,"displayName":"URL for custom Outlook Today","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_URLforcustomOutlookToday;L_EntertheURLofOutlookTodayswebpagemax129chars","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the URL of a custom web page to be displayed in place of Outlook Today.","supportedPlatforms":["Windows"],"tags":["Outlook Today Settings","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_URLforSMIMEcertificates;L_EnterURL","uniqueId":3522,"displayName":"Enter URL:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting provides a URL at which Outlook users can obtain S/MIME certificates. \n\nIf you enable this policy setting, you can enter a URL from which users can obtain S/MIME certificates. The URL can contain three variables, %1, %2, and %3, which will be replaced by the user's name, e-mail address, and language, respectively. When users click \"Get a Digital ID\", they will be directed to the supplied URL. \n\nIf you disable or do not configure this policy setting, a URL for S/MIME certificates is not provided.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"enrollpageurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_URLforSMIMEcertificates","uniqueId":3523,"displayName":"URL for S/MIME certificates","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_URLforSMIMEcertificates;L_EnterURL","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting provides a URL at which Outlook users can obtain S/MIME certificates. \n\nIf you enable this policy setting, you can enter a URL from which users can obtain S/MIME certificates. The URL can contain three variables, %1, %2, and %3, which will be replaced by the user's name, e-mail address, and language, respectively. When users click \"Get a Digital ID\", they will be directed to the supplied URL. \n\nIf you disable or do not configure this policy setting, a URL for S/MIME certificates is not provided.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_UselegacyOutlookauthenticationdialogs","uniqueId":3617,"displayName":"Use legacy Change Password authentication dialog boxes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"By default, Outlook displays the Windows authentication dialog box when users are prompted to change their passwords. By enabling this setting, you can change this behavior so that older-style Outlook dialog boxes that include the Change Password button are displayed.","supportedPlatforms":["Windows"],"tags":["Exchange","Account Settings","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\rpc","registrySubPath":"disablecredui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_UseProtectedViewForAttachmentsReceivedFromInternalSenders","uniqueId":3493,"displayName":"Use Protected View for attachments received from internal senders","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to determine if attachments received from senders within your organization open in Protected View.  This setting only applies to Outlook accounts setup to use an Exchange server.\n\nIf you enable this policy setting, attachments received from senders within your organization open in Protected View.\n\nIf you disable or do not configure this policy setting, attachments received from senders within your organization do not open in Protected View.","supportedPlatforms":["Windows"],"tags":["Security","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\security","registrySubPath":"markinternalasunsafe","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Usethisresponsewhenyouproposenewmeetingtimes","uniqueId":3336,"displayName":"Use this response when you propose new meeting times","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Usethisresponsewhenyouproposenewmeetingtimes;L_usethisresponsewhenyouproposenewmeetingtimes6","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Usethisresponsewhenyouproposenewmeetingtimes;L_usethisresponsewhenyouproposenewmeetingtimes6","uniqueId":3335,"displayName":"Use this response when you propose new meeting times","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tentative","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Accept","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Decline","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":2,"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"propose response type","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_WeatherServiceUrl;L_Empty","uniqueId":3341,"displayName":"Weather Service URL","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to configure the weather service URL for Outlook.\n\nIf you enable this policy setting, you must enter your desired weather service URL.\n\nIf you disable or do not configure this policy setting, Outlook uses the default weather service URL.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"weatherserviceurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"outlk16;L_WeatherServiceUrl","uniqueId":3342,"displayName":"Weather Service URL","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_WeatherServiceUrl;L_Empty","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the weather service URL for Outlook.\n\nIf you enable this policy setting, you must enter your desired weather service URL.\n\nIf you disable or do not configure this policy setting, Outlook uses the default weather service URL.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_WeatherUpdateFrequency","uniqueId":3344,"displayName":"Weather Bar Update Frequency","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_WeatherUpdateFrequency;L_WeatherUpdateFrequencyIntervalSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to set the update frequency (in minutes) for the Weather Bar. \n\nIf you enable this policy setting, Outlook sets the update frequency to the specified value. \n\nIf you disable or do not configure this policy setting, Outlook uses the default value of 120 minutes.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_WeatherUpdateFrequency;L_WeatherUpdateFrequencyIntervalSpinID","uniqueId":3343,"displayName":"Update frequency (in minutes):","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":120,"maximum":10080},"dataType":"Integer"},"defaultValue":"120","description":"This policy setting allows you to set the update frequency (in minutes) for the Weather Bar. \n\nIf you enable this policy setting, Outlook sets the update frequency to the specified value. \n\nIf you disable or do not configure this policy setting, Outlook uses the default value of 120 minutes.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"weatherupdatefrequency","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Whennewitemsarrive;L_Brieflychangethemousecursor","uniqueId":3255,"displayName":"Briefly change the mouse cursor","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"changepointer","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Whennewitemsarrive;L_Playasound","uniqueId":3254,"displayName":"Play a sound","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"playsound","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Whennewitemsarrive;L_Showanenvelopeiconinthesystemtray","uniqueId":3256,"displayName":"Show an envelope icon in the system tray","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"showenvelope","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Whennewitemsarrive","uniqueId":3257,"displayName":"When new items arrive","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Whennewitemsarrive;L_Playasound","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Whennewitemsarrive;L_Brieflychangethemousecursor","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Whennewitemsarrive;L_Showanenvelopeiconinthesystemtray","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Whensendingamessage;L_AddpropertiestoattachmentstoenableReplywithChanges","uniqueId":3265,"displayName":"Add properties to attachments to enable Reply with Changes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"[Deprecated]\nThis policy has been replaced with a new policy that allows the preferences to be set individually. For more information, see https://go.microsoft.com/fwlink/?linkid=2333436","supportedPlatforms":["Windows"],"tags":["Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\mail","registrySubPath":"adhocreviewbehavior","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Whensendingamessage;L_Allowcommasasaddressseparator","uniqueId":3261,"displayName":"Allow commas as address separator","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"[Deprecated]\nThis policy has been replaced with a new policy that allows the preferences to be set individually. For more information, see https://go.microsoft.com/fwlink/?linkid=2333436","supportedPlatforms":["Windows"],"tags":["Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"allowcommasinrecip","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Whensendingamessage;L_Automaticnamechecking","uniqueId":3262,"displayName":"Automatic name checking","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"[Deprecated]\nThis policy has been replaced with a new policy that allows the preferences to be set individually. For more information, see https://go.microsoft.com/fwlink/?linkid=2333436","supportedPlatforms":["Windows"],"tags":["Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"autonamecheck","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Whensendingamessage;L_DeletemeetingrequestfromInboxwhenresponding","uniqueId":3263,"displayName":"Delete meeting request from Inbox when responding","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"[Deprecated]\nThis policy has been replaced with a new policy that allows the preferences to be set individually. For more information, see https://go.microsoft.com/fwlink/?linkid=2333436","supportedPlatforms":["Windows"],"tags":["Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"deletewhenrespond","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Whensendingamessage;L_Messagesexpireafterdays","uniqueId":3260,"displayName":"Messages expire after (days)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":3652},"dataType":"Integer"},"description":"[Deprecated]\nThis policy has been replaced with a new policy that allows the preferences to be set individually. For more information, see https://go.microsoft.com/fwlink/?linkid=2333436","supportedPlatforms":["Windows"],"tags":["Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"numdaysexpire","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Whensendingamessage;L_Setimportance","uniqueId":3258,"displayName":"Set importance","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"High","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Normal","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Low","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":2,"description":"[Deprecated]\nThis policy has been replaced with a new policy that allows the preferences to be set individually. For more information, see https://go.microsoft.com/fwlink/?linkid=2333436","supportedPlatforms":["Windows"],"tags":["Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"importance","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Whensendingamessage;L_Setsensitivity","uniqueId":3259,"displayName":"Set sensitivity","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Normal","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Personal","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Private","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Confidential","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"[Deprecated]\nThis policy has been replaced with a new policy that allows the preferences to be set individually. For more information, see https://go.microsoft.com/fwlink/?linkid=2333436","supportedPlatforms":["Windows"],"tags":["Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"sensitivity","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Whensendingamessage;L_SuggestnameswhilecompletingToCcandBccfields","uniqueId":3264,"displayName":"Suggest names while completing To, Cc, and Bcc fields","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"[Deprecated]\nThis policy has been replaced with a new policy that allows the preferences to be set individually. For more information, see https://go.microsoft.com/fwlink/?linkid=2333436","supportedPlatforms":["Windows"],"tags":["Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\preferences","registrySubPath":"showautosug","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Whensendingamessage","uniqueId":3266,"displayName":"[Deprecated] When sending a message","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Whensendingamessage;L_Setimportance","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Whensendingamessage;L_Setsensitivity","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Whensendingamessage;L_Messagesexpireafterdays","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Whensendingamessage;L_Allowcommasasaddressseparator","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Whensendingamessage;L_Automaticnamechecking","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Whensendingamessage;L_DeletemeetingrequestfromInboxwhenresponding","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Whensendingamessage;L_SuggestnameswhilecompletingToCcandBccfields","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Whensendingamessage;L_AddpropertiestoattachmentstoenableReplywithChanges","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"[Deprecated]\nThis policy has been replaced with a new policy that allows the preferences to be set individually. For more information, see https://go.microsoft.com/fwlink/?linkid=2333436","supportedPlatforms":["Windows"],"tags":["Advanced E-mail Options","E-mail Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_WorkflowTasksinOutlook","uniqueId":3766,"displayName":"Do not display \"Open this task\" button for workflow tasks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"As part of E-mail notification of workflow tasks, users can edit a task by clicking the \"Open this task\" button to display the task dialog box for the workflow task. When this setting is enabled, the \"Open this task\" button is not displayed.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Outlook 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\workflow","registrySubPath":"disabletaskedit","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Workinghours;L_EndTime","uniqueId":3330,"displayName":"End Time:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1020,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"5:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"12:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":30,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"12:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":60,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":90,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":120,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"2:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":150,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"2:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":180,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"3:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":210,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"3:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":240,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"4:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":270,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"4:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":300,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"5:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":330,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"5:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":360,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"6:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":390,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"6:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":420,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"7:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":450,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"7:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":480,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"8:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":510,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"8:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":540,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"9:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":570,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"9:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":600,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"10:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":630,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"10:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":660,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"11:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":690,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"11:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":720,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"12:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":750,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"12:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":780,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":810,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":840,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"2:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":870,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"2:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":900,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"3:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":930,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"3:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":960,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"4:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":990,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"4:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":1020,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"5:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":1050,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"5:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":1080,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"6:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":1110,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"6:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":1140,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"7:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":1170,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"7:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":1200,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"8:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":1230,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"8:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":1260,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"9:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":1290,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"9:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":1320,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"10:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":1350,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"10:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":1380,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"11:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":1410,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"11:30 PM","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1020,"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"caldefend","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Workinghours;L_Starttime","uniqueId":3329,"displayName":"Start time:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":480,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"8:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"12:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":30,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"12:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":60,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":90,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":120,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"2:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":150,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"2:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":180,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"3:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":210,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"3:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":240,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"4:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":270,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"4:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":300,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"5:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":330,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"5:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":360,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"6:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":390,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"6:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":420,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"7:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":450,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"7:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":480,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"8:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":510,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"8:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":540,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"9:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":570,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"9:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":600,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"10:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":630,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"10:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":660,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"11:00 AM","description":"","tags":[],"dependencyGroup":null},{"value":690,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"11:30 AM","description":"","tags":[],"dependencyGroup":null},{"value":720,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"12:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":750,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"12:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":780,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":810,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":840,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"2:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":870,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"2:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":900,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"3:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":930,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"3:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":960,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"4:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":990,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"4:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":1020,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"5:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":1050,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"5:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":1080,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"6:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":1110,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"6:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":1140,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"7:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":1170,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"7:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":1200,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"8:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":1230,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"8:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":1260,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"9:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":1290,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"9:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":1320,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"10:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":1350,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"10:30 PM","description":"","tags":[],"dependencyGroup":null},{"value":1380,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"11:00 PM","description":"","tags":[],"dependencyGroup":null},{"value":1410,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"11:30 PM","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":480,"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"caldefstart","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Workinghours","uniqueId":3331,"displayName":"Working hours","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Workinghours;L_Starttime","logicalOperator":"exists","values":null},{"dependee":"outlk16;L_Workinghours;L_EndTime","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlk16;L_Workweek;L_Lengthofworkweek","uniqueId":3323,"displayName":"Length of work week:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":124,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Monday to Friday","description":"","tags":[],"dependencyGroup":null},{"value":120,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Monday to Thursday","description":"","tags":[],"dependencyGroup":null},{"value":60,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tuesday to Friday","description":"","tags":[],"dependencyGroup":null},{"value":126,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Monday to Saturday","description":"","tags":[],"dependencyGroup":null},{"value":30,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Wednesday to Saturday","description":"","tags":[],"dependencyGroup":null},{"value":142,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Thursday to Sunday","description":"","tags":[],"dependencyGroup":null},{"value":252,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sunday to Friday","description":"","tags":[],"dependencyGroup":null},{"value":254,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"All seven days","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":124,"description":"Sets the value in the option \"Calendar work week\".","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\calendar","registrySubPath":"workday","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlk16;L_Workweek","uniqueId":3324,"displayName":"Work week","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"outlk16;L_Workweek;L_Lengthofworkweek","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value in the option \"Calendar work week\".","supportedPlatforms":["Windows"],"tags":["Calendar Options","Preferences","Outlook Options","Microsoft Outlook 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"outlooknew;L_ContactSupport","uniqueId":5392,"displayName":"Allow access to Contact Support in the new Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls whether Contact Support is available in the new Outlook.\n\nBy default, Microsoft 365 tenant admins and users on Beta Channel have access to Contact Support in the new Outlook.\n\nIf you enable this policy setting, Microsoft 365 tenant admins and users on Beta Channel have access to Contact Support in the new Outlook.\n\nIf you disable this policy setting, users won’t have access to Contact Support in the new Outlook, even if they’re Microsoft 365 tenant admins or users on Beta Channel.\n\nIf you don’t configure this policy setting, Microsoft 365 tenant admins and users on Beta Channel have access to Contact Support in the new Outlook.\n\nNote: Users that have access to Contact Support can run automatic diagnostic troubleshooting, because that’s needed for contacting support. They can run diagnostic troubleshooting even if you have set to the “Allow users to run diagnostic troubleshooting in the new Outlook” policy to Disabled.","supportedPlatforms":["Web"],"tags":["Other","Outlook Options","Microsoft Outlook New","Cloud Policies Boolean","Cloud Policies","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook\\options\\general","registrySubPath":"contactsupport","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"outlooknew;L_OutlookForWindowsPrimaryAccountMustMatchDeviceSignInAccount","uniqueId":5393,"displayName":"Require the Primary Account to match the Windows signed-in account","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls the account used as the Primary Account in the new Outlook for Windows.\n\nIf you enable this policy setting, the new Outlook for Windows will require the Primary Account to have an SMTP address or alias that matches the Windows signed-in account.\n\nIf you disable this policy setting, users are not restricted in their choice of Primary Account.\n\nIf you do not set this policy setting, users are not restricted in their choice of Primary Account.\n\nNote: This policy setting only applies to new Outlook for Windows.\n","supportedPlatforms":["Windows"],"tags":["Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\outlook","registrySubPath":"outlookforwindowsprimaryaccountmustmatchdevicesigninaccount","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_AllowAutoExtendForDesktop","uniqueId":4138,"displayName":"Allow PowerPoint to also automatically extend the display when presenting on a desktop","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting specifies whether PowerPoint can also automatically extend the display when users present on a desktop computer.\n\nIf you enable this policy setting, PowerPoint will automatically extend the display when users present on a desktop computer, if the \"Automatically extend display when presenting on a laptop or tablet\" checkbox on the UI under File | Options | Advanced | Display is checked.\n\nIf you disable or do not configure this policy setting, PowerPoint does not automatically extend the display when users present on a desktop computer, even if the \"Automatically extend display when presenting on a laptop or tablet\" checkbox on the UI under File | Options | Advanced | Display is checked.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"allowautoextendfordesktop","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_AllowSelectionFloaties","uniqueId":3885,"displayName":"Show Mini Toolbar on selection","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Disabling this policy setting will result in Mini Toolbar not being displayed on text selection. By default, Mini Toolbar on selection is enabled and its visibility can be changed via a setting in the PowerPoint Options dialog box.","supportedPlatforms":["Windows"],"tags":["General","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\powerpoint","registrySubPath":"allowselectionfloaties","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_AllowTrustedLocationsOnTheNetwork","uniqueId":3996,"displayName":"Allow Trusted Locations on the network","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting controls whether trusted locations on the network can be used.\n\nIf you enable this policy setting, users can specify trusted locations on network shares or in other remote locations that are not under their direct control by clicking the \"Add new location\" button in the Trusted Locations section of the Trust Center. Content, code, and add-ins are allowed to load from trusted locations with minimal security and without prompting the user for permission.\n\nIf you disable this policy setting, the selected application ignores any network locations listed in the Trusted Locations section of the Trust Center. \n\nIf you also deploy Trusted Locations via Group Policy, you should verify whether any of them are remote locations. If any of them are remote locations and you do not allow remote locations via this policy setting, those policy keys that point to remote locations will be ignored on client computers.\n\nDisabling this policy setting does not delete any network locations from the Trusted Locations list, but causes disruption for users who add network locations to the Trusted Locations list. Users are also prevented from adding new network locations to the Trusted Locations list in the Trust Center.  We recommended that you do not enable this policy setting (as the \"Allow Trusted Locations on my network (not recommended)\" check box also states). Therefore, in practice, it should be possible to disable this policy setting in most situations without causing significant usability issues for most users.\n\nIf you do not enable this policy setting, users can select the \"Allow Trusted Locations on my network (not recommended)\" check box if desired and then specify trusted locations by clicking the \"Add new location\" button.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations","registrySubPath":"allownetworklocations","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_AutoFitbodytexttoplaceholder","uniqueId":3888,"displayName":"AutoFit body text to placeholder","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["AutoFormat as you type","Proofing","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"autofittextbody","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_AutoFittitletexttoplaceholder","uniqueId":3887,"displayName":"AutoFit title text to placeholder","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["AutoFormat as you type","Proofing","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"autofittexttitle","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_BackgroundAccessibilityCheckerInformation","uniqueId":3883,"displayName":"Check for accessibility issues while editing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting controls whether accessibility issues are checked for automatically while the user is editing a presentation. By default, accessibility issues aren’t checked for automatically.\n\nIf you enable this policy setting, accessibility issues are checked for automatically and users won’t be able to turn it off. The status bar will indicate if accessibility recommendations are available to make the presentation more usable by people with disabilities.\n\nIf you disable or don’t configure this policy setting, accessibility issues won’t be checked for automatically while editing a presentation. Users can turn on automatic checking by going to File > Options > Ease of Access.\n","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"enableaccchecker","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_Backgroundprinting","uniqueId":3915,"displayName":"Print in background ","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"backgroundprint","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_BlockAllUnmanagedAddins","uniqueId":4128,"displayName":"Block all unmanaged add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting blocks all add-ins that are not managed by the \"List of managed add-ins\" policy setting.\n\nIf you enable this policy setting, and the \"List of managed add-ins\" policy setting is also enabled, all add-ins are blocked except those that are configured as 1 (always enabled) or 2 (configurable by the user) in the \"List of managed add-ins\" policy setting.\n\nIf you disable or do not configure this policy setting, users can enable or disable any add-ins that are not managed by the \"List of managed add-ins\" policy setting.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\resiliency","registrySubPath":"restricttolist","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_BlockMacroExecutionFromInternet","uniqueId":3960,"displayName":"Block macros from running in Office files from the internet","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"\n        This policy setting allows you to block macros from running in Office files that come from the internet.\n\n        If you enable this policy setting, macros are blocked from running, even if \"Enable all macros\" is selected in the Macro Settings section of the Trust Center. Users will receive a notification that macros are blocked from running.\n\n        The exceptions when macros will be allowed to run are:\n        - The Office file is saved to a Trusted Location.\n        - The Office file was previously trusted by the user.\n        - Macros are digitally signed and the matching Trusted Publisher certificate is installed on the device.\n\n        If you disable this policy setting, the settings configured in the Macro Settings section of the Trust Center determine whether macros run in Office files that come from the internet.\n\n        If you don’t configure this policy setting, macros will be blocked from running. Users will receive a notification telling them of the security risks of macros from the internet along with a link to learn more.\n\n        For more information, see https://go.microsoft.com/fwlink/p/?linkid=2185771.\n      ","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security","registrySubPath":"blockcontentexecutionfrominternet","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_ChartRefTrackingEnabled","uniqueId":4131,"displayName":"Allow formatting and labels to track data points","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting governs how custom formatting and data labels react to data changes in a chart.\n\nIf you enable or do not configure this policy setting, when the user creates a new presentation, custom formatting and data labels follow data points as they move or change in any chart in the workbook.\n\nIf you disable this policy setting, custom formatting and data labels do not follow data points, but instead follow data point indices.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"charttrackingrefbased","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_Checkspellingasyoutype","uniqueId":3890,"displayName":"Check spelling as you type","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Proofing","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"background spell checking","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_ConfigureCNGCipherChainingMode","uniqueId":3942,"displayName":"Configure CNG cipher chaining mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_ConfigureCNGCipherChainingMode;L_ConfigureCNGCipherChainingModeDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the cipher chaining mode used.\n\nIf you enable this policy setting, the cipher chaining mode specified will be applied.\n\nIf you disable or do not configure this policy setting, Cipher Block Chaining (CBC) will be the default CNG cipher chaining mode used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_ConfigureCNGCipherChainingMode;L_ConfigureCNGCipherChainingModeDropID","uniqueId":3941,"displayName":"Configure CNG cipher chaining mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"ChainingModeCBC","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cipher Block Chaining (CBC)","description":"","tags":[],"dependencyGroup":null},{"value":"ChainingModeCFB","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cipher Feedback (CFB)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"ChainingModeCBC","description":"This policy setting allows you to configure the cipher chaining mode used.\n\nIf you enable this policy setting, the cipher chaining mode specified will be applied.\n\nIf you disable or do not configure this policy setting, Cipher Block Chaining (CBC) will be the default CNG cipher chaining mode used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\crypto","registrySubPath":"cipherchaining","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_DefaultCustomTab","uniqueId":4136,"displayName":"Show custom templates tab by default in PowerPoint on the Office Start screen and in File | New","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether custom templates (when they exist) show as the default tab in PowerPoint on the Office Start screen and in File | New. \n\nIf you enable this policy setting, users will the see custom templates tab as the default tab in PowerPoint on the Office Start screen and in File | New when templates exist (this can include Custom XML programmed templates, templates in the Workgroup templates path, templates in the Personal templates path, or SharePoint templates).\n\nIf you disable or do not configure this policy setting, users will see the Featured templates tab as the default tab in PowerPoint on the Office Start screen and in File | New, unless all Office-provided templates have been disabled.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"officestartdefaulttab","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_Defaultfilelocation","uniqueId":3895,"displayName":"Default file location","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_Defaultfilelocation;L_defaultfilelocation0","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the default location for presentation files.","supportedPlatforms":["Windows"],"tags":["Save","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_Defaultfilelocation;L_defaultfilelocation0","uniqueId":3894,"displayName":"Default file location","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"Specifies the default location for presentation files.","supportedPlatforms":["Windows"],"tags":["Save","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\recentfolderlist","registrySubPath":"default","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_DefaultMuteAudioInRecordingPresenterView","uniqueId":4145,"displayName":"Turn off microphone recording by default when recording a slide show","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to set microphone recording off by default when recording a slide show.\n\nBy default, microphone recording is on the first time a user records a slide show. If the user turns off microphone recording, then microphone recording will be off the next time the slide show recording window is launched, even if PowerPoint is closed and reopened.\n\nIf you enable this policy setting, microphone recording is turned off by default. A user can turn on microphone recording when recording a slide show. But, the next time the slide show recording window is launched, microphone recording will be off by default.\n\nIf you disable or don’t configure this policy setting, the default state of microphone recording is determined by the user.\n\nNote: Enabling this policy setting also turns off camera recording by default when recording a slide show. There is a separate policy setting if you just want to turn off camera recording by default when recording a slide show.\n    ","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint","registrySubPath":"muteaudiodefaultvalueinrecordingpresenterview","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_DefaultMuteAudioInScreenRecorder","uniqueId":4144,"displayName":"Turn off audio recording for screen recording","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control the initial audio recording setting for a screen recording in PowerPoint. By default, audio is recorded during a screen recording.\n \nIf you enable this policy setting, audio isn’t recorded during a screen recording. But, the user can choose to turn on audio recording manually in the UI.\n \nIf you disable or don’t configure this policy setting, audio is recorded during a screen recording. The user can choose to turn off audio recording manually in the UI.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\screenrecorder","registrySubPath":"muteaudiodefaultvalue","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_DefaultVideoOffInRecordingPresenterView","uniqueId":4149,"displayName":"Turn off camera recording by default when recording a slide show","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to set camera recording off by default when recording a slide show.\n\nBy default, camera recording is on the first time a user records a slide show. If the user turns off camera recording, then camera recording will be off the next time the slide show recording window is launched, even if PowerPoint is closed and reopened.\n\nIf you enable this policy setting, camera recording is turned off by default. A user can turn on camera recording when recording a slide show. But, the next time the slide show recording window is launched, camera recording will be off by default.\n\nIf you disable or don’t configure this policy setting, the default state of camera recording is determined by the user, unless the “Turn off microphone recording by default when recording a slide show” policy setting is enabled. Enabling that policy setting also turns off camera recording by default.\n    ","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint","registrySubPath":"videooffdefaultvalueinrecordingpresenterview","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_Determinewhethertoforceencryptedppt","uniqueId":3934,"displayName":"Scan encrypted macros in PowerPoint Open XML presentations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_Determinewhethertoforceencryptedppt;L_DeterminewhethertoforceencryptedpptDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls whether encrypted macros in Open XML presentations are required to be scanned with anti-virus software before being opened.\n\nIf you enable this policy setting, you may choose one of these options:\n\n- Scan encrypted macros: encrypted macros are disabled unless anti-virus software is installed.  Encrypted macros are scanned by your anti-virus software when you attempt to open an encrypted presentation that contains macros.\n- Scan if anti-virus software available: if anti-virus software is installed, scan the encrypted macros first before allowing them to load.  If anti-virus software is not available, allow encrypted macros to load.\n- Load macros without scanning: do not check for anti-virus software and allow macros to be loaded in an encrypted file.\n\nIf you disable or do not configure this policy setting, the behavior will be similar to the \"Scan encrypted macros\" option.","supportedPlatforms":["Windows"],"tags":["Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_Determinewhethertoforceencryptedppt;L_DeterminewhethertoforceencryptedpptDropID","uniqueId":3933,"displayName":"Scan encrypted macros in PowerPoint Open XML presentations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Scan encrypted macros (default)","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Scan if anti-virus software available","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Load macros without scanning","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls whether encrypted macros in Open XML presentations are required to be scanned with anti-virus software before being opened.\n\nIf you enable this policy setting, you may choose one of these options:\n\n- Scan encrypted macros: encrypted macros are disabled unless anti-virus software is installed.  Encrypted macros are scanned by your anti-virus software when you attempt to open an encrypted presentation that contains macros.\n- Scan if anti-virus software available: if anti-virus software is installed, scan the encrypted macros first before allowing them to load.  If anti-virus software is not available, allow encrypted macros to load.\n- Load macros without scanning: do not check for anti-virus software and allow macros to be loaded in an encrypted file.\n\nIf you disable or do not configure this policy setting, the behavior will be similar to the \"Scan encrypted macros\" option.","supportedPlatforms":["Windows"],"tags":["Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security","registrySubPath":"powerpointbypassencryptedmacroscan","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_Disableallapplicationextensions","uniqueId":3971,"displayName":"Disable all application add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting disables all add-ins for the specified Office 2016 applications.\n      \nIf you enable this policy setting, all add-ins for the specified Office 2016 applications are disabled.\n\nIf you disable or do not configure this policy setting, all add-ins for the specified Office 2016 applications are allowed to run without notifying the users.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security","registrySubPath":"disablealladdins","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_DisableAutoSaveWhenCoauthoring","uniqueId":4148,"displayName":"Don’t automatically save changes when working in the same PowerPoint presentation as others","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether changes are saved automatically when users are working together in the same presentation.\n\nBy default, when users are working together in the same presentation, changes are automatically saved. This allows users to see the edits made by others in real time. But, some add-ins or solutions might not be compatible with PowerPoint saving so frequently.\n\nIf you enable this policy setting, changes aren’t saved automatically and users won’t see real-time edits.\n\nIf you disable or don't configure this policy setting, changes are saved automatically and users will see real-time edits.\n\nNote: this policy setting doesn’t affect the AutoRecover settings configured under File > Options > Save.\n    ","supportedPlatforms":["Windows"],"tags":["Co-authoring","Collaboration Settings","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\coauthoring","registrySubPath":"disableautosavewhencoauthoring","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_disablecommandbarbuttonsandmenuitems157","uniqueId":4121,"displayName":"Disable commands","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_disablecommandbarbuttonsandmenuitems157;L_EnteracommandbarIDtodisable","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable any command bar button and menu item with a command bar ID, including command bar buttons and menu items that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, all default command bar buttons or menu items are available to users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_disablecommandbarbuttonsandmenuitems157;L_EnteracommandbarIDtodisable","uniqueId":4120,"displayName":"Enter a command bar ID to disable","settingType":{"possibleValues":{"possibleValuesType":"List","ValueType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to disable any command bar button and menu item with a command bar ID, including command bar buttons and menu items that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, all default command bar buttons or menu items are available to users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\disabledcmdbaritemslist","registryPath":"TCID","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_Disablecommandbarbuttonsandmenuitems;L_BroadcastSlideShow","uniqueId":4110,"displayName":"Slide Show tab | Start Slide Show | Broadcast Slide Show","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"16461","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n\nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\disabledcmdbaritemscheckboxes","registrySubPath":"slideshowbroadcast","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_Disablecommandbarbuttonsandmenuitems","uniqueId":4111,"displayName":"Disable predefined commands","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_Disablecommandbarbuttonsandmenuitems;L_FileWebPagePreview","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_Disablecommandbarbuttonsandmenuitems;L_FileSendToMailRecipient","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_Disablecommandbarbuttonsandmenuitems;L_InsertHyperlinkPPT","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsLanguage","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroMacrosPPT","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroSecurity","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroVisualBasicEditorPPT","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_Disablecommandbarbuttonsandmenuitems;L_WebAddressPPT","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_Disablecommandbarbuttonsandmenuitems;L_BroadcastSlideShow","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n\nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\disabledcmdbaritemscheckboxes","registrySubPath":"weboptions","enforcedValues":{}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\disabledcmdbaritemscheckboxes","registrySubPath":"filepublishaswebpage","enforcedValues":{}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\disabledcmdbaritemscheckboxes","registrySubPath":"fileopensearchtheweb","enforcedValues":{}}]}}},{"id":"ppt16;L_Disablecommandbarbuttonsandmenuitems;L_FileSendToMailRecipient","uniqueId":4103,"displayName":"File tab | Share | Send Using E-mail","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"18209","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n\nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\disabledcmdbaritemscheckboxes","registrySubPath":"sendtomailrecipient","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_Disablecommandbarbuttonsandmenuitems;L_FileWebPagePreview","uniqueId":4102,"displayName":"File tab | Options | Customize Ribbon | All Commands | Web Page Preview","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"3655","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n\nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\disabledcmdbaritemscheckboxes","registrySubPath":"filewebpagepreview","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_Disablecommandbarbuttonsandmenuitems;L_InsertHyperlinkPPT","uniqueId":4104,"displayName":"Insert tab | Links | Hyperlink","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"12599","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n\nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\disabledcmdbaritemscheckboxes","registrySubPath":"inserthyperlink","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsLanguage","uniqueId":4105,"displayName":"Review tab | Language | Language","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"22144","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n\nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\disabledcmdbaritemscheckboxes","registrySubPath":"toolslanguage","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroMacrosPPT","uniqueId":4106,"displayName":"Developer tab | Code | Macros","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"186","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n\nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacromacros","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroSecurity","uniqueId":4107,"displayName":"Developer tab | Code | Macro Security","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"3627","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n\nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacrosecurity","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroVisualBasicEditorPPT","uniqueId":4108,"displayName":"Developer tab | Code | Visual Basic","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1695","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n\nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacrovbe","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_Disablecommandbarbuttonsandmenuitems;L_WebAddressPPT","uniqueId":4109,"displayName":"File tab | Options | Customize Ribbon | All Commands | Address\n","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1740","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items in the specified applications. \n\nIf you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application.  The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\disabledcmdbaritemscheckboxes","registrySubPath":"webaddress","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_DisableGalleryPreviews","uniqueId":3884,"displayName":"Enable Live Preview","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Shows or hides the Live Preview that appear when using Galleries that support previews.  Live Preview shows how a command would be applied without actually applying it to the document.","supportedPlatforms":["Windows"],"tags":["General","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"livepreview","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_DisableIncrementalDownload","uniqueId":4151,"displayName":"Wait to show users a cloud-based presentation until all content is downloaded","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy setting allows you to control whether PowerPoint waits until all content is downloaded before showing a presentation to the user. This policy setting applies to presentations that are opened from a cloud-based location, such as OneDrive Personal, OneDrive for Business, or SharePoint Online.\n\nBy default, when the user opens a cloud-based presentation in PowerPoint, the user can view the presentation while other content, such as images or video, continues to download. But, some functionality, such as editing and presenting, is limited or not available until the entire contents of the presentation are downloaded.\n\nIf you enable this policy setting, PowerPoint will wait, when opening a cloud-based presentation, until the entire contents of the presentation are downloaded before showing the presentation to the user.\n\nYou may want to enable this policy setting if you have add-ins or automated processes that rely on the entire contents of the presentation being available and fully editable as soon as the presentation is shown.\n\nIf you disable or don't configure this setting, PowerPoint opens cloud-based files more quickly, so the user can start viewing the presentation while the other content downloads.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n    ","supportedPlatforms":["Windows"],"tags":["General","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint","registrySubPath":"disableincrementaldownload","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_DisableLiveSubtitles","uniqueId":4152,"displayName":"Don’t allow the use of Live Subtitles","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy setting controls whether users can turn on Live Subtitles during a presentation. By default, Live Subtitles are off but can be turned on by users.\n\nIf you enable this policy setting, users can't turn on Live Subtitles during a presentation.\n\nIf you disable or don't configure this policy setting, users can turn on Live Subtitles.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n    ","supportedPlatforms":["Windows"],"tags":["General","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint","registrySubPath":"disablelivesubtitles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_DisableOfficeStartPowerPoint","uniqueId":4133,"displayName":"Disable the Office Start screen for PowerPoint","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the Office Start screen appears on boot for PowerPoint.\n\nIf you enable this policy setting, users will not see the Office Start screen when they boot PowerPoint.\n\nIf you disable or do not configure this policy setting, users will see the Office Start screen when they boot PowerPoint.\n\nNote: This policy setting is overridden by the policy setting \"Microsoft Office 2016 > Miscellaneous > Disable the Office Start screen for all Office applications\" if that policy setting is set.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"disableboottoofficestart","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_DisablePackageforCD","uniqueId":3892,"displayName":"Disable Package For CD","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Check to Disable Package for CD; Uncheck to Enable Package for CD. Shows or hides the File tab | Save & Send | Package Presentation for CD command. Package for CD allows the user to package and burn presentations onto CD for portable viewing even when PowerPoint is not installed.","supportedPlatforms":["Windows"],"tags":["Save","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security","registrySubPath":"disablepackageforcd","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_DisableQuickStarter","uniqueId":4150,"displayName":"Turn off QuickStarter","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether QuickStarter is available to users. By default, QuickStarter is available to users if they meet the language and region requirements for the feature.\n\nIf you enable this policy setting, QuickStarter won’t be available to users.\n\nIf you disable or don’t configure this policy setting, QuickStarter will be available to users if they meet the language and region requirements for the feature.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n    ","supportedPlatforms":["Windows"],"tags":["General","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint","registrySubPath":"disablequickstarter","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_DisableSetTopology","uniqueId":4137,"displayName":"Do not allow PowerPoint to automatically extend the display when presenting on a laptop or tablet","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting specifies whether PowerPoint automatically extends the display when users present on a laptop or tablet computer.\n\nIf you enable this policy setting, PowerPoint does not automatically extend the display when users present on a laptop or tablet computer. In addition, the \"Automatically extend display when presenting on a laptop or tablet\" checkbox on the user interface (UI) under File | Options | Advanced | Display  is unchecked.\n\nIf you disable or do not configure this policy setting, PowerPoint automatically extends the display when users present on a laptop or tablet computer. Users can change this behavior by unchecking the \"Automatically extend display when presenting on a laptop or tablet\" checkbox on the UI under File | Options | Advanced | Display","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"disablesettopology","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_disableshortcutkeys158","uniqueId":4123,"displayName":"Disable shortcut keys","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_disableshortcutkeys158;L_Enterakeyandmodifiertodisable","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable any shortcut key by using its virtual key code ID, including shortcut keys that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter a virtual key code ID number to disable a specific shortcut key.\n\nIf you disable or do not configure this policy setting, all default shortcut keys are enabled for users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_disableshortcutkeys158;L_Enterakeyandmodifiertodisable","uniqueId":4122,"displayName":"Enter a key and modifier to disable","settingType":{"possibleValues":{"possibleValuesType":"List","ValueType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to disable any shortcut key by using its virtual key code ID, including shortcut keys that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter a virtual key code ID number to disable a specific shortcut key.\n\nIf you disable or do not configure this policy setting, all default shortcut keys are enabled for users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\disabledshortcutkeyslist","registryPath":"KeyMod","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_Disableshortcutkeys;L_AltF11ToolsMacroVisualBasicEditorPPT","uniqueId":4115,"displayName":"Alt+F11 (Developer | Code | Visual Basic)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"122,16","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific shortcut key combinations in the specified applications. \n\nIf you enable this policy setting you can disable specific shortcut keys for the selected application.  The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\disabledshortcutkeyscheckboxes","registrySubPath":"toolsmacrovbe","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_Disableshortcutkeys;L_AltF8ToolsMacroMacros","uniqueId":4114,"displayName":"Alt+F8 (Developer | Code | Macros)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"119,16","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific shortcut key combinations in the specified applications. \n\nIf you enable this policy setting you can disable specific shortcut keys for the selected application.  The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\disabledshortcutkeyscheckboxes","registrySubPath":"toolsmacromacros","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_Disableshortcutkeys;L_CtrlF5BroadcastSlideShow","uniqueId":4116,"displayName":"Ctrl+F5 (Slide Show | Start Slide Show | Broadcast Slide Show)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"116,8","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific shortcut key combinations in the specified applications. \n\nIf you enable this policy setting you can disable specific shortcut keys for the selected application.  The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\disabledshortcutkeyscheckboxes","registrySubPath":"slideshowbroadcast","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_Disableshortcutkeys;L_CtrlFFindPPT","uniqueId":4112,"displayName":"Ctrl+F (Home | Editing | Find)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"70,8","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific shortcut key combinations in the specified applications. \n\nIf you enable this policy setting you can disable specific shortcut keys for the selected application.  The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\disabledshortcutkeyscheckboxes","registrySubPath":"find","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_Disableshortcutkeys;L_CtrlKInsertHyperlinkPPT","uniqueId":4113,"displayName":"Ctrl+K (Insert | Links |  Hyperlink)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"75,8","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific shortcut key combinations in the specified applications. \n\nIf you enable this policy setting you can disable specific shortcut keys for the selected application.  The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\disabledshortcutkeyscheckboxes","registrySubPath":"inserthyperlink","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_Disableshortcutkeys","uniqueId":4117,"displayName":"Disable shortcut keys","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_Disableshortcutkeys;L_CtrlFFindPPT","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_Disableshortcutkeys;L_CtrlKInsertHyperlinkPPT","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_Disableshortcutkeys;L_AltF8ToolsMacroMacros","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_Disableshortcutkeys;L_AltF11ToolsMacroVisualBasicEditorPPT","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_Disableshortcutkeys;L_CtrlF5BroadcastSlideShow","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable specific shortcut key combinations in the specified applications. \n\nIf you enable this policy setting you can disable specific shortcut keys for the selected application.  The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_DisableSlideUpdate","uniqueId":4127,"displayName":"Disable Slide Update","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can link slides in a presentation with their counterparts in a PowerPoint Slide Library.\n\nIf you enable this policy setting, PowerPoint cannot check the status of a slide in a Slide Library when a presentation with Slide Update data is opened.\n\nIf you disable or do not configure this policy setting, each time users open a presentation that contains a shared slide, PowerPoint notifies them if the slide has been updated and provides them with the opportunity to ignore the update, append a new slide to the outdated slide, or replace the outdated slide with the updated one.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\slide libraries","registrySubPath":"disableslideupdate","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_DisableSummarySlideSectionZoom","uniqueId":4147,"displayName":"Don’t allow Summary Zoom, Slide Zoom, and Section Zoom in a PowerPoint presentation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can insert and playback a Summary Zoom, a Slide Zoom, or a Section Zoom in a PowerPoint presentation. By default, users can use these types of Zoom in a presentation.\n\nIf you enable this policy setting, users can’t use these types of Zoom in a presentation.\n\nIf you disable or don’t configure this policy setting, users can use these types of Zoom in a presentation.\n    ","supportedPlatforms":["Windows"],"tags":["General","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint","registrySubPath":"disablesummaryslidesectionzoom","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_DisableTrustBarNotificationforunsigned","uniqueId":3973,"displayName":"Disable Trust Bar Notification for unsigned application add-ins and block them","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable such add-ins without notification. This policy setting only applies if you enable the \"Require that application add-ins are signed by Trusted Publisher\" policy setting, which prevents users from changing this policy setting.\n\nIf you enable this policy setting, applications automatically disable unsigned add-ins without informing users.\n \nIf you disable this policy setting, if this application is configured to require that all add-ins be signed by a trusted publisher, any unsigned add-ins the application loads will be disabled and the application will display the Trust Bar at the top of the active window. The Trust Bar contains a message that informs users about the unsigned add-in.\n\nIf you do not configure this policy setting, the disable behavior applies, and in addition, users can configure this requirement themselves in the \"Add-ins\" category of the Trust Center for the application.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security","registrySubPath":"notbpromptunsignedaddin","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_DisableTrustedLoc","uniqueId":3997,"displayName":"Disable all trusted locations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows administrators to disable all trusted locations in the specified applications. Trusted locations specified in the Trust Center are used to define file locations that are assumed to be safe. Content, code, and add-ins are allowed to load from trusted locations with a minimal amount of security, without prompting the users for permission. If a dangerous file is opened from a trusted location, it will not be subject to standard security measures and could harm users' computers or data.\n      \nIf you enable this policy setting, all trusted locations (those specified in the Trust Center) in the specified applications are ignored, including any trusted locations established by Office 2016 during setup, deployed to users using Group Policy, or added by users themselves.  Users will be prompted again when opening files from trusted locations.\n\nIf you disable or do not configure this policy setting, all trusted locations (those specified in the Trust Center) in the specified applications are assumed to be safe.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations","registrySubPath":"alllocationsdisabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_DisplayDeveloperTab","uniqueId":3902,"displayName":"Display Developer tab in the Ribbon","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the Developer tab will be displayed in the Ribbon.\n\nIf you enable this policy setting, the Developer tab will be displayed in the Ribbon.\n\nIf you disable this policy setting, the Developer tab will not be displayed in the Ribbon.\n\nIf you do not configure this policy setting, the Developer tab will not be displayed in the Ribbon, but its visibility can be changed via a setting in the application Options dialog box.","supportedPlatforms":["Windows"],"tags":["Customize Ribbon","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"developertools","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_DisplayEnterpriseThemes","uniqueId":4143,"displayName":"Display enterprise themes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_DisplayEnterpriseThemes;L_DisplayEnterpriseThemesDontShowOthers","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_DisplayEnterpriseThemes;L_DisplayEnterpriseThemesGalleryTitle","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy allows you to display enterprise themes in the ribbon galleries. You can also name the category for the themes, and you can hide all the Office in-box and connected gallery themes.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_DisplayEnterpriseThemes;L_DisplayEnterpriseThemesDontShowOthers","uniqueId":4141,"displayName":"Only show enterprise themes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy allows you to display enterprise themes in the ribbon galleries. You can also name the category for the themes, and you can hide all the Office in-box and connected gallery themes.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"themesgalleryshowcorporateonly","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_DisplayEnterpriseThemes;L_DisplayEnterpriseThemesGalleryTitle","uniqueId":4142,"displayName":"Enterprise themes category title","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy allows you to display enterprise themes in the ribbon galleries. You can also name the category for the themes, and you can hide all the Office in-box and connected gallery themes.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"themesgallerycorporatesectiontitle","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_DoNotOpenFilesFromTheInternetZoneInProtectedView","uniqueId":3927,"displayName":"Do not open files from the internet zone in Protected View","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting allows you to determine if files downloaded from the internet zone open in Protected View.\n\nIf you enable this policy setting, files downloaded from the internet zone do not open in Protected View.\n\nIf you disable or do not configure this policy setting, files downloaded from the internet zone open in Protected View.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\protectedview","registrySubPath":"disableinternetfilesinpv","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_DoNotOpenFilesInUnsafeLocationsInProtectedView","uniqueId":3926,"displayName":"Do not open files in unsafe locations in Protected View","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting lets you determine if files located in unsafe locations will open in Protected View.  If you have not specified unsafe locations, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders are considered unsafe locations.\n\nIf you enable this policy setting, files located in unsafe locations do not open in Protected View.\n\nIf you disable or do not configure this policy setting, files located in unsafe locations open in Protected View.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\protectedview","registrySubPath":"disableunsafelocationsinpv","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_DownloadImages","uniqueId":4099,"displayName":"Unblock automatic download of linked images","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether PowerPoint automatically downloads links from external sources.\n\nIf you enable this policy setting, PowerPoint will load images saved in remote locations.\n\nIf you disable or do not configure this policy setting, when PowerPoint opens a presentation it does not display any linked images saved on a different computer unless the presentation itself is saved in a trusted location (as configured in the Trust Center).","supportedPlatforms":["Windows"],"tags":["Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security","registrySubPath":"downloadimages","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_Draganddroptextediting","uniqueId":3904,"displayName":"Allow text to be dragged and dropped","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"draganddrop","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_EnablecontextualspellingPolicy","uniqueId":3889,"displayName":"Check grammar with spelling","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Enabling this policy to turn contextual spelling on by default.","supportedPlatforms":["Windows"],"tags":["Proofing","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\shared tools\\proofing tools\\1.0\\office","registrySubPath":"powerpointspellingoptions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_EnableModernCommentsCreateNew","uniqueId":4153,"displayName":"Use modern comments in PowerPoint","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\nThis policy setting controls whether modern comments are used in PowerPoint. For more information about modern comments and when to enable this setting, see https://go.microsoft.com/fwlink/p/?linkid=2116065.\n\nIf you enable this policy setting, when a user adds comments to a new file or a file without comments, the new comments that are added will be modern comments. If users have a version of PowerPoint that doesn’t support modern comments, a notification appears directing them to use PowerPoint for the web to view modern comments in files that have them.\n\nIf you disable this policy setting, users will continue to see the previous commenting experience for new files and existing files that do not have any modern comments. Users will still be able to read files that already have modern comments in them if they have a version of PowerPoint that supports modern comments.\n\nFor information about what happens when you don't configure this policy setting, see https://go.microsoft.com/fwlink/p/?linkid=2116065.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n    ","supportedPlatforms":["Windows","Web","Mac","iOS","Android"],"tags":["General","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies","AnonymousPolicyAssignment"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint","registrySubPath":"enablemoderncommentscreatenew","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_EnableRecordingRibbonTab","uniqueId":4146,"displayName":"Turn on recording ribbon tab","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control the initial recording ribbon tab in PowerPoint. By default, the tab is not visible.\n\nIf you enable this policy setting, recording ribbon tab is visible. But, the user can choose to turn off the feature manually in the UI.\n\nIf you disable or don’t configure this policy setting, recording ribbon tab is not visible. The user can choose to turn on the feature manually in the UI.\n    ","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint","registrySubPath":"enablerecordingribbontab","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_Endwithblackslide","uniqueId":3914,"displayName":"End with black slide","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"ssendonblankslide","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_ForceAutoAdvanceInitiallyOff","uniqueId":4119,"displayName":"Turn off automatically advancing slides (Use Timings) initially","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy settings allows you to set the initial state of automatically advancing slides (Use Timings).\n\nIf you enable this policy, automatically advancing slides (Use Timings) will be set to off initially for all new and existing presentations.\n\nIf you disable or do not configure this policy, automatically advancing slides (Use Timings) is set to on for new presentations, and for existing presentations to the state that was saved in the file. This is the default behavior.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"forceautoadvanceinitiallyoff","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_GraphicFilters","uniqueId":3989,"displayName":"Graphic Filters","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_GraphicFilters;L_GraphicFiltersDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_GraphicFilters;L_GraphicFiltersDropID","uniqueId":3988,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\fileblock","registrySubPath":"graphicfilters","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_Hidebuiltintablestyles","uniqueId":4118,"displayName":"Hide built in table styles","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Hides the built in table styles for PowerPoint.  By default, built-in styles are shown.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"hidebuiltintablestyles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_KeepLastAutoSavedVersions","uniqueId":3891,"displayName":"Keep the last AutoSaved versions of files for the next session","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether PowerPoint keeps the last AutoSaved version of a file if a user closes a file without saving it.  (Note: AutoSave applies only when AutoRecover is enabled.)\n\nIf you enable or do not configure this policy setting, PowerPoint keeps the last AutoSaved version of the file and makes it available to the user the next time the file is opened if the user closes a file without saving it.\n\nIf you disable this policy setting, PowerPoint does not keep the last AutoSaved version of the file if the user closes a file without saving it.","supportedPlatforms":["Windows"],"tags":["Save","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"keepunsavedchanges","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_LegacyConvertersForPowerPoint","uniqueId":3987,"displayName":"Legacy converters for PowerPoint","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_LegacyConvertersForPowerPoint;L_LegacyConvertersForPowerPointDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_LegacyConvertersForPowerPoint;L_LegacyConvertersForPowerPointDropID","uniqueId":3986,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\fileblock","registrySubPath":"converters","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_Listoferrormessagestocustomize","uniqueId":4101,"displayName":"List of error messages to customize","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_Listoferrormessagestocustomize;L_listoferrormessagestocustomize80","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the list of error messages to customize.","supportedPlatforms":["Windows"],"tags":["Customizable Error Messages","Microsoft PowerPoint 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\customizablealerts","registrySubPath":"policyon","enforcedValues":{"enabled":1}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\customizablealerts","registrySubPath":"policyon","enforcedValues":{"enabled":1}}]}}},{"id":"ppt16;L_Listoferrormessagestocustomize;L_listoferrormessagestocustomize80","uniqueId":4100,"displayName":"List of error messages to customize","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"Specifies the list of error messages to customize.","supportedPlatforms":["Windows"],"tags":["Customizable Error Messages","Microsoft PowerPoint 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\customizablealerts","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_ListOfManagedAddins","uniqueId":4130,"displayName":"List of managed add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_ListOfManagedAddins;L_ListOfManagedAddins2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify which add-ins are always enabled, always disabled (blocked), or configurable by the user. To block add-ins that are not managed by this policy setting, you must also configure the \"Block all unmanaged add-ins\" policy setting.\n\nTo enable this policy setting, provide the following information for each add-in:\n\nIn \"Value name,\" specify the programmatic identifier (ProgID) for COM add-ins, or specify the file name of PowerPoint add-ins.\n\nTo obtain the ProgID for an add-in, use Registry Editor on the client computer where the add-in is installed to locate key names under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Office\\PowerPoint\\Addins or HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Office\\PowerPoint\\Addins.\n\nTo obtain the file name of an add-in, click the File menu in the application where the add-in is installed. Click Options, click Add-ins, and then use the Location column to determine the file name of the add-in.\n\nYou can also obtain the ProgID or the file name of an add-in by using Office Telemetry Dashboard.\n\nIn \"Value,\" specify the value as follows:\n\nTo specify that an add-in is always disabled (blocked), type 0.\n\nTo specify that an add-in is always enabled, type 1.\n\nTo specify that an add-in is configurable by the user and not blocked by the \"Block all unmanaged add-ins\" policy setting when enabled, type 2.\n\nIf you disable or do not enable this policy setting, the list of managed add-ins is deleted. If the \"Block all unmanaged add-ins\" policy setting is enabled, then all add-ins are blocked.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft PowerPoint 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\resiliency\\addinlist","registrySubPath":"policyon","enforcedValues":{"enabled":1}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\resiliency\\addinlist","registrySubPath":"policyon","enforcedValues":{"enabled":1}}]}}},{"id":"ppt16;L_ListOfManagedAddins;L_ListOfManagedAddins2","uniqueId":4129,"displayName":"List of managed add-ins","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to specify which add-ins are always enabled, always disabled (blocked), or configurable by the user. To block add-ins that are not managed by this policy setting, you must also configure the \"Block all unmanaged add-ins\" policy setting.\n\nTo enable this policy setting, provide the following information for each add-in:\n\nIn \"Value name,\" specify the programmatic identifier (ProgID) for COM add-ins, or specify the file name of PowerPoint add-ins.\n\nTo obtain the ProgID for an add-in, use Registry Editor on the client computer where the add-in is installed to locate key names under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Office\\PowerPoint\\Addins or HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Office\\PowerPoint\\Addins.\n\nTo obtain the file name of an add-in, click the File menu in the application where the add-in is installed. Click Options, click Add-ins, and then use the Location column to determine the file name of the add-in.\n\nYou can also obtain the ProgID or the file name of an add-in by using Office Telemetry Dashboard.\n\nIn \"Value,\" specify the value as follows:\n\nTo specify that an add-in is always disabled (blocked), type 0.\n\nTo specify that an add-in is always enabled, type 1.\n\nTo specify that an add-in is configurable by the user and not blocked by the \"Block all unmanaged add-ins\" policy setting when enabled, type 2.\n\nIf you disable or do not enable this policy setting, the list of managed add-ins is deleted. If the \"Block all unmanaged add-ins\" policy setting is enabled, then all add-ins are blocked.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft PowerPoint 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\resiliency\\addinlist","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_Makehiddenmarkupvisible","uniqueId":4098,"displayName":"Make hidden markup visible","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether hidden markup is visible when users open PowerPoint files in standard or HTML format.\n\nIf you enable this policy setting, PowerPoint ignores this flag when opening a file, and always displays any markup present in the file. In addition, when saving a file, PowerPoint sets the flag to display markup when the presentation is next opened.\n\nIf you disable this policy setting, PowerPoint sets the flag according to the state of the \"Show Markup\" option on the Review tab of the Ribbon when it saves presentations in standard or HTML format. In addition, PowerPoint enables or disables the \"Show Markup\" option according to the way the flag is set when it opens files, which means that a presentation saved with hidden markup is opened with the markup still hidden.\n\nIf you disable this policy setting, the behavior is the equivalent of Enabled.","supportedPlatforms":["Windows"],"tags":["Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"markupopensave","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_Maximumnumberofundos","uniqueId":3906,"displayName":"Maximum number of undos","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_Maximumnumberofundos;L_maximumnumberofundos2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the maximum number of undo levels.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_Maximumnumberofundos;L_maximumnumberofundos2","uniqueId":3905,"displayName":"Maximum number of undos","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":3,"maximum":150},"dataType":"Integer"},"description":"Specifies the maximum number of undo levels.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"number of undos","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_MicrosoftOfficeOpenXMLConvertersForPowerPoint","uniqueId":3991,"displayName":"Microsoft Office Open XML converters for PowerPoint","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_MicrosoftOfficeOpenXMLConvertersForPowerPoint;L_MicrosoftOfficeOpenXMLConvertersForPowerPointDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_MicrosoftOfficeOpenXMLConvertersForPowerPoint;L_MicrosoftOfficeOpenXMLConvertersForPowerPointDropID","uniqueId":3990,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\fileblock","registrySubPath":"ooxmlconverters","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_OfficeFileBlockIncludeTrustedFiles","uniqueId":5306,"displayName":"File Block includes trusted files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy setting controls whether File Block settings for a file type apply to Trusted Files of the same file type.\n\nIf you enable this policy setting, Trusted Files will have to follow what the File Block setting is for the given file type.\n\nIf you disable or do not configure this policy setting, Trusted Files will not follow the File Block setting for the given file type.","supportedPlatforms":["Windows"],"tags":["OfficeFileBlockIncludeTrustedFiles","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\fileblock","registrySubPath":"IncludeTrustedFiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_OLEActions;L_Empty","uniqueId":3937,"displayName":"OLE Active Content","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"disable (don't allow activating OLE Active Content)","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"enable (prompt user before activating OLE Active Content)","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"enable all (allow activating OLE Active Content without prompting)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":1,"description":"This policy setting controls the prompting and activation behavior for the \"OLE Active Content\" option in PowerPoint.\n\nIf you enable this policy setting, you can choose from three options to control how the \"OLE Active Content\" option functions:\n\n- Disable (don't activate any OLE Active Content). If users click an action button with the \"Object action\" action assigned to it, nothing will happen.\n\n- Enable (prompt user before activating OLE Active Content). If users click an action button with the \"Object action\" action assigned to it, PowerPoint will prompt them to continue before activating the action. This option enforces the default configuration in PowerPoint.\n\n- Enable all (allow activating OLE Active Content without prompting). If users click an action button with the \"Object action\" action assigned to it. PowerPoint will activate the action automatically, without prompting.\n\nIf you do not configure this policy setting, PowerPoint follows the Enable (prompt user before activating OLE Active Content) option.","supportedPlatforms":["Windows"],"tags":["Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security","registrySubPath":"enableoleactions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_OLEActions","uniqueId":3938,"displayName":"OLE Active Content","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_OLEActions;L_Empty","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls the prompting and activation behavior for the \"OLE Active Content\" option in PowerPoint.\n\nIf you enable this policy setting, you can choose from three options to control how the \"OLE Active Content\" option functions:\n\n- Disable (don't activate any OLE Active Content). If users click an action button with the \"Object action\" action assigned to it, nothing will happen.\n\n- Enable (prompt user before activating OLE Active Content). If users click an action button with the \"Object action\" action assigned to it, PowerPoint will prompt them to continue before activating the action. This option enforces the default configuration in PowerPoint.\n\n- Enable all (allow activating OLE Active Content without prompting). If users click an action button with the \"Object action\" action assigned to it. PowerPoint will activate the action automatically, without prompting.\n\nIf you do not configure this policy setting, PowerPoint follows the Enable (prompt user before activating OLE Active Content) option.","supportedPlatforms":["Windows"],"tags":["Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_OpenDocumentPresentationFiles","uniqueId":3979,"displayName":"OpenDocument Presentation files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_OpenDocumentPresentationFiles;L_OpenDocumentPresentationFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_OpenDocumentPresentationFiles;L_OpenDocumentPresentationFilesDropID","uniqueId":3978,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\fileblock","registrySubPath":"opendocumentpresentation","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_OpenFilesOnLocalIntranetUNCInProtectedView","uniqueId":3925,"displayName":"Open files on local Intranet UNC in Protected View","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting lets you determine if files on local Intranet UNC file shares open in Protected View.\n\nIf you enable this policy setting, files on local Intranet UNC file shares open in Protected View if their UNC paths appear to be within the internet zone.\n\nIf you disable or do not configure this policy setting, files on Intranet UNC file shares do not open in Protected View if their UNC paths appear to be within the internet zone.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\protectedview","registrySubPath":"disableintranetcheck","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_OutlineFiles","uniqueId":3985,"displayName":"Outline files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_OutlineFiles;L_OutlineFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_OutlineFiles;L_OutlineFilesDropID","uniqueId":3984,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\fileblock","registrySubPath":"outlines","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_PersonalTemplatesPath","uniqueId":4135,"displayName":"Personal templates path for PowerPoint","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_PersonalTemplatesPath;L_PersonalTemplatesPath","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the location of a user's personal templates. \n\nIf you enable this policy setting, users will see any templates they have saved in the specified location in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will change to be the specified location. \n\nIf you disable or do not configure this policy setting, users will not see templates they have saved in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will be their document save location.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_PersonalTemplatesPath;L_PersonalTemplatesPath","uniqueId":4134,"displayName":"Personal templates path for PowerPoint","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting specifies the location of a user's personal templates. \n\nIf you enable this policy setting, users will see any templates they have saved in the specified location in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will change to be the specified location. \n\nIf you disable or do not configure this policy setting, users will not see templates they have saved in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will be their document save location.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"personaltemplates","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_Popupmenuonrightmouseclick","uniqueId":3912,"displayName":"Show menu on right mouse click","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checked: Checks the option ''Show menu on right mouse click''. | Unchecked: Unchecks the option ''Show menu on right mouse click''.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"ssrightmouse","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_PowerPoint2007AndLaterPresentationsShowsTemplatesThemesAndAddInFiles","uniqueId":3977,"displayName":"PowerPoint 2007 and later presentations, shows, templates, themes and add-in files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_PowerPoint2007AndLaterPresentationsShowsTemplatesThemesAndAddInFiles;L_PowerPoint2007AndLaterPresentationsShowsTemplatesThemesAndAddInFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_PowerPoint2007AndLaterPresentationsShowsTemplatesThemesAndAddInFiles;L_PowerPoint2007AndLaterPresentationsShowsTemplatesThemesAndAddInFilesDropID","uniqueId":3976,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\fileblock","registrySubPath":"openxmlfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_PowerPoint972003PresentationsShowsTemplatesandAddInFiles","uniqueId":3981,"displayName":"PowerPoint 97-2003 presentations, shows, templates and add-in files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_PowerPoint972003PresentationsShowsTemplatesandAddInFiles;L_PowerPoint972003PresentationsShowsTemplatesandAddInFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_PowerPoint972003PresentationsShowsTemplatesandAddInFiles;L_PowerPoint972003PresentationsShowsTemplatesandAddInFilesDropID","uniqueId":3980,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\fileblock","registrySubPath":"binaryfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_PowerPointBetaConverters","uniqueId":3993,"displayName":"PowerPoint beta converters","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_PowerPointBetaConverters;L_PowerPointBetaConvertersDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_PowerPointBetaConverters;L_PowerPointBetaConvertersDropID","uniqueId":3992,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\fileblock","registrySubPath":"powerpoint12betafilesfromconverters","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_PowerPointBetaFiles","uniqueId":3995,"displayName":"PowerPoint beta files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_PowerPointBetaFiles;L_PowerPointBetaFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_PowerPointBetaFiles;L_PowerPointBetaFilesDropID","uniqueId":3994,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\fileblock","registrySubPath":"powerpoint12betafiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_PowerPointDesignerOptions","uniqueId":4140,"displayName":"PowerPoint Designer Options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_PowerPointDesignerOptions;L_PowerPointDesignerOptions","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows an administrator to enable or disable PowerPoint Designer","supportedPlatforms":["Windows"],"tags":["PowerPoint Designer","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_PowerPointDesignerOptions;L_PowerPointDesignerOptions","uniqueId":4139,"displayName":"PowerPoint Designer Options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable PowerPoint Designer","description":"","tags":[],"dependencyGroup":null},{"value":73187,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable PowerPoint Designer","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":73187,"recommendation":"accessibilitybaseline"}],"defaultValue":0,"description":"This policy setting allows an administrator to enable or disable PowerPoint Designer","supportedPlatforms":["Windows"],"tags":["PowerPoint Designer","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"enablesuggestionservicegrouppolicy","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_PreventCoAuthoring","uniqueId":4124,"displayName":"Prevent co-authoring","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls how PowerPoint opens a file for editing on document management servers that support co-authoring.\n\nIf you enable this policy setting, PowerPoint will prevent co-authoring by taking an exclusive file lock. \n\nIf you disable or do not configure this policy setting, PowerPoint will allow co-authoring by taking short-term shared locks. \n\nNote: When file synchronization via SOAP over HTTP is turned off it will prevent co-authoring.","supportedPlatforms":["Windows"],"tags":["Co-authoring","Collaboration Settings","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\coauthoring","registrySubPath":"disablecoauthoring","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_Printinsertedobjectsatprinterresolution","uniqueId":3919,"displayName":"Print inserted objects at printer resolution","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"send printer information to ole servers","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_PrintTrueTypefontsasgraphics","uniqueId":3916,"displayName":"Print TrueType fonts as graphics","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"send truetype fonts as bitmaps","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_PromptIfPowerPointIsNotDefault","uniqueId":4132,"displayName":"Prompt the user if PowerPoint is not the default application for its file extensions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting specifies whether PowerPoint prompts users to change their file extension associations for any file types that are no longer associated with PowerPoint.\n\nIf you enable this policy setting, when users start PowerPoint, they are not prompted to change file extensions for any files that are no longer associated with PowerPoint. In addition, the checkbox on the user interface (UI) under File |Options | General | Start up options | Tell me is unchecked.\n\nIf you disable or do not configure this policy setting, when users start PowerPoint, they are prompted to change file extensions for any files that are no longer associated with PowerPoint. Users can change this behavior either by selecting the checkbox displayed in the prompt, or by selecting the UI checkbox under File |Options | General | Start up options | Tell me (which is selected by default).\n","supportedPlatforms":["Windows"],"tags":["General","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"alertifnotdefault","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_PublicLivePresentations","uniqueId":5307,"displayName":"Public Live Presentations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls ability for users in the tenant to start public Live Presentations in PowerPoint for Web. Public Live Presentation can be joined by anyone who has short URL or QR code associated with this Live Presentation.","supportedPlatforms":["Web"],"tags":["PowerPoint Options","Cloud Policies","AnonymousPolicyAssignment"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"L_PublicLivePresentations","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_Recentlyusedfilelist","uniqueId":3909,"displayName":"Number of presentations in the Recent Presentations list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_Recentlyusedfilelist;L_Sizeofrecentlyusedfilelist","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the number of entries displayed in the Recent Presentations list that appears when users click Open on the File tab in Backstage view.\n\nIf you enable this policy setting, you can specify the number of entries to be between 0 and 50. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 25 items will be displayed in the Recent Presentations list.\n\nNote: If you want to prevent items from being added to the Recent Presentations list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_Recentlyusedfilelist;L_Sizeofrecentlyusedfilelist","uniqueId":3908,"displayName":"Size of recently used file list","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":50},"dataType":"Integer"},"description":"This policy setting specifies the number of entries displayed in the Recent Presentations list that appears when users click Open on the File tab in Backstage view.\n\nIf you enable this policy setting, you can specify the number of entries to be between 0 and 50. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 25 items will be displayed in the Recent Presentations list.\n\nNote: If you want to prevent items from being added to the Recent Presentations list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\file mru","registrySubPath":"max display","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_Replacestraightquoteswithsmartquotes","uniqueId":3886,"displayName":"Replace straight quotes with smart quotes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["AutoFormat as you type","Proofing","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"smartquotes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_RequirethatApplicationExtensionsaresigned","uniqueId":3972,"displayName":"Require that application add-ins are signed by Trusted Publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting controls whether add-ins for this applications must be digitally signed by a trusted publisher.\n \nIf you enable this policy setting, this application checks the digital signature for each add-in before loading it. If an add-in does not have a digital signature, or if the signature did not come from a trusted publisher, this application disables the add-in and notifies the user. Certificates must be added to the Trusted Publishers list if you require that all add-ins be signed by a trusted publisher. For detail on about obtaining and distributing certificates, see http://go.microsoft.com/fwlink/?LinkId=294922. Office 2016 stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store.  Office 2016 still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store. Therefore, if you created a list of trusted publishers in a previous version of Office and you upgrade to Office 2016, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store. For more information about trusted publishers, see the Office Resource Kit.\n\nIf you disable or do not configure this policy setting, this application does not check the digital signature on application add-ins before opening them. If a dangerous add-in is loaded, it could harm users' computers or compromise data security.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security","registrySubPath":"requireaddinsig","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_Resizegraphicstofitbrowserwindow","uniqueId":3924,"displayName":"Resize graphics to fit browser window","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["General","Web Options...","Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\internet","registrySubPath":"donotresizegraphics","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_RunPrograms;L_Empty","uniqueId":3935,"displayName":"Run Programs","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"disable (don't run any programs)","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"enable (prompt user before running)","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"enable all (run without prompting)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls the prompting and activation behavior for the \"Run Programs\" option for action buttons in PowerPoint.\n\nIf you enable this policy setting, you can choose from three options to control how the \"Run Programs\" option functions:\n\n- Disable (don't run any programs). If users click an action button with the \"Run Programs\" action assigned to it, nothing will happen. This option enforces the default configuration in PowerPoint.\n\n- Enable (prompt user before running). If users click an action button with the \"Run Programs\" action assigned to it, PowerPoint will prompt them to continue before running the program.\n\n- Enable all (run without prompting). If users click an action button with the \"Run Programs\" action assigned to it. PowerPoint will run the program automatically, without prompting.\n\nIf you disable or do not configure this policy setting, if users click an action with the \"Run Programs\" action assigned to it, nothing will happen. This behavior is the same as Enabled -- Disable (don't run any programs).","supportedPlatforms":["Windows"],"tags":["Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security","registrySubPath":"runprograms","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_RunPrograms","uniqueId":3936,"displayName":"Run Programs","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_RunPrograms;L_Empty","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls the prompting and activation behavior for the \"Run Programs\" option for action buttons in PowerPoint.\n\nIf you enable this policy setting, you can choose from three options to control how the \"Run Programs\" option functions:\n\n- Disable (don't run any programs). If users click an action button with the \"Run Programs\" action assigned to it, nothing will happen. This option enforces the default configuration in PowerPoint.\n\n- Enable (prompt user before running). If users click an action button with the \"Run Programs\" action assigned to it, PowerPoint will prompt them to continue before running the program.\n\n- Enable all (run without prompting). If users click an action button with the \"Run Programs\" action assigned to it. PowerPoint will run the program automatically, without prompting.\n\nIf you disable or do not configure this policy setting, if users click an action with the \"Run Programs\" action assigned to it, nothing will happen. This behavior is the same as Enabled -- Disable (don't run any programs).","supportedPlatforms":["Windows"],"tags":["Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_SaveAutoRecoverinfo;L_AutoRecoversavefrequencyminutes","uniqueId":3897,"displayName":"AutoRecover save frequency (minutes):","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":9999},"dataType":"Integer"},"description":"Checked: Checks the option ''Save AutoRecover info''. | Unchecked: Unchecks the option ''Save AutoRecover info''.","supportedPlatforms":["Windows"],"tags":["Save","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"frequencytosaveautorecoveryinfo","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_SaveAutoRecoverinfo;L_AutoRecoversavelocation","uniqueId":3898,"displayName":"AutoRecover save location","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Checked: Checks the option ''Save AutoRecover info''. | Unchecked: Unchecks the option ''Save AutoRecover info''.","supportedPlatforms":["Windows"],"tags":["Save","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"pathtoautorecoveryinfo","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_SaveAutoRecoverinfo;L_EnablesaveAutoRecoverinfo","uniqueId":3896,"displayName":"Enable save AutoRecover info","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checked: Checks the option ''Save AutoRecover info''. | Unchecked: Unchecks the option ''Save AutoRecover info''.","supportedPlatforms":["Windows"],"tags":["Save","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"saveautorecoveryinfo","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_SaveAutoRecoverinfo","uniqueId":3899,"displayName":"Save AutoRecover info","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_SaveAutoRecoverinfo;L_EnablesaveAutoRecoverinfo","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_SaveAutoRecoverinfo;L_AutoRecoversavefrequencyminutes","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_SaveAutoRecoverinfo;L_AutoRecoversavelocation","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Checked: Checks the option ''Save AutoRecover info''. | Unchecked: Unchecks the option ''Save AutoRecover info''.","supportedPlatforms":["Windows"],"tags":["Save","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_SavePowerPointfilesas","uniqueId":3901,"displayName":"Default file format","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_SavePowerPointfilesas;L_savepowerpointfilesas1","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting governs the default format for new presentation files that users create.\n      \nIf you enable this policy setting, when a user creates a new blank presentation, it is in the specified default format.  Users may still override the default and specify a specific format when they create a presentation.\n\nIf you disable or do not configure this policy setting, PowerPoint Presentation is the default option.","supportedPlatforms":["Windows"],"tags":["Save","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_SavePowerPointfilesas;L_savepowerpointfilesas1","uniqueId":3900,"displayName":"Save PowerPoint files as","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":27,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"PowerPoint Presentation (*.pptx)","description":"","tags":[],"dependencyGroup":null},{"value":28,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"PowerPoint Macro-Enabled Presentation (*.pptm)","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"PowerPoint 97-2003 Presentation (*.ppt)","description":"","tags":[],"dependencyGroup":null},{"value":52,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"OpenDocument Presentation (*.odp)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":27,"description":"This policy setting governs the default format for new presentation files that users create.\n      \nIf you enable this policy setting, when a user creates a new blank presentation, it is in the specified default format.  Users may still override the default and specify a specific format when they create a presentation.\n\nIf you disable or do not configure this policy setting, PowerPoint Presentation is the default option.","supportedPlatforms":["Windows"],"tags":["Save","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"defaultformat","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_SetCNGCipherAlgorithm","uniqueId":3940,"displayName":"Set CNG cipher algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_SetCNGCipherAlgorithm;L_SetCNGCipherAlgorithmID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the CNG cipher algorithm that is used.\n\nIf you enable this policy setting, then the cipher provided will be used if it is a supported algorithm.\n\nIf you disable or do not configure this policy setting, AES will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_SetCNGCipherAlgorithm;L_SetCNGCipherAlgorithmID","uniqueId":3939,"displayName":"CNG cipher algorithm:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to configure the CNG cipher algorithm that is used.\n\nIf you enable this policy setting, then the cipher provided will be used if it is a supported algorithm.\n\nIf you disable or do not configure this policy setting, AES will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\crypto","registrySubPath":"cipheralgorithm","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_SetCNGCipherKeyLength","uniqueId":3944,"displayName":"Set CNG cipher key length","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_SetCNGCipherKeyLength;L_SetCNGCipherKeyLengthSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the number of bits to use when creating the cipher key.  This number will be rounded down to a multiple of 8.\n\nIf you enable this policy setting, the key bits specified will be used.\n\nIf you disable or do not configure this policy setting, the default value will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_SetCNGCipherKeyLength;L_SetCNGCipherKeyLengthSpinID","uniqueId":3943,"displayName":"Cipher key length","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":1000000},"dataType":"Integer"},"defaultValue":"","description":"This policy setting allows you to configure the number of bits to use when creating the cipher key.  This number will be rounded down to a multiple of 8.\n\nIf you enable this policy setting, the key bits specified will be used.\n\nIf you disable or do not configure this policy setting, the default value will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\crypto","registrySubPath":"cipherkeybits","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_SetCNGPasswordSpinCount","uniqueId":3953,"displayName":"Set CNG password spin count","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_SetCNGPasswordSpinCount;L_SetCNGPasswordSpinCountSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the number of times to spin (rehash) the password verifier.\n\nIf you enable this policy setting, the number specified will be the number of times the password will be rehashed.\n\nIf you disable or do not configure this policy setting, the default (100000) will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_SetCNGPasswordSpinCount;L_SetCNGPasswordSpinCountSpinID","uniqueId":3952,"displayName":"Set CNG password spin count","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":10000000},"dataType":"Integer"},"defaultValue":"100000","description":"This policy setting allows you to specify the number of times to spin (rehash) the password verifier.\n\nIf you enable this policy setting, the number specified will be the number of times the password will be rehashed.\n\nIf you disable or do not configure this policy setting, the default (100000) will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\crypto","registrySubPath":"passwordspincount","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_SetDefaultFileBlockBehavior","uniqueId":3975,"displayName":"Set default file block behavior","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_SetDefaultFileBlockBehavior;L_SetDefaultFileBlockBehaviorDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine if users can open, view, or edit Word files.\n\nIf you enable this policy setting, you can set one of these options:\n- Blocked files are not opened\n- Blocked files open in Protected View and can not be edited\n- Blocked files open in Protected View and can be edited\n\nIf you disable or do not configure this policy setting, users will be able to open blocked files, but not edit them.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_SetDefaultFileBlockBehavior;L_SetDefaultFileBlockBehaviorDropID","uniqueId":3974,"displayName":"Set default file block behavior","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Blocked files are not opened","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Blocked files open in Protected View and can not be edited","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Blocked files open in Protected View and can be edited","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine if users can open, view, or edit Word files.\n\nIf you enable this policy setting, you can set one of these options:\n- Blocked files are not opened\n- Blocked files open in Protected View and can not be edited\n- Blocked files open in Protected View and can be edited\n\nIf you disable or do not configure this policy setting, users will be able to open blocked files, but not edit them.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\fileblock","registrySubPath":"openinprotectedview","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_SetDocumentBehaviorIfFileValidationFails","uniqueId":3931,"displayName":"Set document behavior if file validation fails","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_SetDocumentBehaviorIfFileValidationFails;L_SetDocumentBehaviorIfFileValidationFailsDropID","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_SetDocumentBehaviorIfFileValidationFails;L_SetDocumentBehaviorIfFileValidationFailsStr3","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls how Office handles documents when they fail file validation. \n\nIf you enable this policy setting, you can configure the following options for files that fail file validation:\n\n- Block files completely. Users cannot open the files.\n- Open files in Protected View and disallow edit. Users cannot edit the files. This is also how Office handles the files if you disable this policy setting.\n- Open files in Protected View and allow edit. Users can edit the files. This is also how Office handles the files if you do not configure this policy setting.\n\nIf you disable this policy setting, Office follows the \"Open files in Protected View and disallow edit\" behavior.\n\nIf you do not configure this policy setting, Office follows the \"Open files in Protected View and allow edit\" behavior.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_SetDocumentBehaviorIfFileValidationFails;L_SetDocumentBehaviorIfFileValidationFailsDropID","uniqueId":3929,"displayName":"Set document behavior if file validation fails","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block files","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":1,"description":"This policy setting controls how Office handles documents when they fail file validation. \n\nIf you enable this policy setting, you can configure the following options for files that fail file validation:\n\n- Block files completely. Users cannot open the files.\n- Open files in Protected View and disallow edit. Users cannot edit the files. This is also how Office handles the files if you disable this policy setting.\n- Open files in Protected View and allow edit. Users can edit the files. This is also how Office handles the files if you do not configure this policy setting.\n\nIf you disable this policy setting, Office follows the \"Open files in Protected View and disallow edit\" behavior.\n\nIf you do not configure this policy setting, Office follows the \"Open files in Protected View and allow edit\" behavior.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\filevalidation","registrySubPath":"openinprotectedview","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_SetDocumentBehaviorIfFileValidationFails;L_SetDocumentBehaviorIfFileValidationFailsStr3","uniqueId":3930,"displayName":"Checked: Allow edit.  Unchecked: Do not allow edit.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":1,"description":"This policy setting controls how Office handles documents when they fail file validation. \n\nIf you enable this policy setting, you can configure the following options for files that fail file validation:\n\n- Block files completely. Users cannot open the files.\n- Open files in Protected View and disallow edit. Users cannot edit the files. This is also how Office handles the files if you disable this policy setting.\n- Open files in Protected View and allow edit. Users can edit the files. This is also how Office handles the files if you do not configure this policy setting.\n\nIf you disable this policy setting, Office follows the \"Open files in Protected View and disallow edit\" behavior.\n\nIf you do not configure this policy setting, Office follows the \"Open files in Protected View and allow edit\" behavior.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\filevalidation","registrySubPath":"disableeditfrompv","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_SetMaximumNumberOfTrustedDocuments","uniqueId":3962,"displayName":"Set maximum number of trusted documents","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_SetMaximumNumberOfTrustedDocuments;L_SetMaximumNumberOfTrustedDocumentsSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the maximum number of trust records for trusted documents that can be stored in the registry before the purge task runs. The purge task reduces the number of trusted documents stored in the registry to the value set by the \"Set maximum number of trust records to preserve\" policy setting.\n\nIf you enable this policy setting, you can specify the maximum number of trusted documents to be stored in the registry before the purge task runs, with an upper limit of 20,000 documents. For performance reasons, we do not recommend setting this policy setting to the upper limit.\n\nIf you disable or do not configure this policy setting, the default value of 500 is used for the maximum number of trusted documents that can be stored in the registry before the purge task runs.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_SetMaximumNumberOfTrustedDocuments;L_SetMaximumNumberOfTrustedDocumentsSpinID","uniqueId":3961,"displayName":"Maximum number:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":20000},"dataType":"Integer"},"defaultValue":"500","description":"This policy setting allows you to specify the maximum number of trust records for trusted documents that can be stored in the registry before the purge task runs. The purge task reduces the number of trusted documents stored in the registry to the value set by the \"Set maximum number of trust records to preserve\" policy setting.\n\nIf you enable this policy setting, you can specify the maximum number of trusted documents to be stored in the registry before the purge task runs, with an upper limit of 20,000 documents. For performance reasons, we do not recommend setting this policy setting to the upper limit.\n\nIf you disable or do not configure this policy setting, the default value of 500 is used for the maximum number of trusted documents that can be stored in the registry before the purge task runs.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted documents","registrySubPath":"maxtrusteddocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_SetMaximumNumberOfTrustRecordsToPreserve","uniqueId":3964,"displayName":"Set maximum number of trust records to preserve","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_SetMaximumNumberOfTrustRecordsToPreserve;L_SetMaximumNumberOfTrustRecordsToPreserveSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the maximum number of trust records to preserve when the purge task detects that this application has trusted more than the number of trusted documents set by the \"Set maximum number of trusted documents\" policy setting.\n\nIf you enable this policy setting, you may specify the maximum number of trust records to preserve, with an upper limit of 20000.  Due to performance reasons, it is not recommended to set it to the upper limit.\n\nIf you disable or you do not configure this policy setting, the default value for of 400 is used.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_SetMaximumNumberOfTrustRecordsToPreserve;L_SetMaximumNumberOfTrustRecordsToPreserveSpinID","uniqueId":3963,"displayName":"Maximum to preserve:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":20000},"dataType":"Integer"},"defaultValue":"400","description":"This policy setting allows you to specify the maximum number of trust records to preserve when the purge task detects that this application has trusted more than the number of trusted documents set by the \"Set maximum number of trusted documents\" policy setting.\n\nIf you enable this policy setting, you may specify the maximum number of trust records to preserve, with an upper limit of 20000.  Due to performance reasons, it is not recommended to set it to the upper limit.\n\nIf you disable or you do not configure this policy setting, the default value for of 400 is used.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted documents","registrySubPath":"maxpreservetrusteddocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_SetNumberOfPlacesInTheRecentPlacesList","uniqueId":3918,"displayName":"Number of folders in the Recent Folders list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_SetNumberOfPlacesInTheRecentPlacesList;L_SetNumberOfPlacesInTheRecentPlacesListSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the number of unpinned entries displayed in the Recent Folders list that appears when users click Open or Save As on the File tab in Backstage view.\n\nIf you enable this policy setting, you can specify the number of unpinned entries to be between 0 and 20. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 5 unpinned items are displayed in the Recent Folders list.\n\nNote: If you want to prevent items from being added to the Recent Folders list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_SetNumberOfPlacesInTheRecentPlacesList;L_SetNumberOfPlacesInTheRecentPlacesListSpinID","uniqueId":3917,"displayName":"Number of folders in the Recent Folders list","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":20},"dataType":"Integer"},"defaultValue":"5","description":"This policy setting specifies the number of unpinned entries displayed in the Recent Folders list that appears when users click Open or Save As on the File tab in Backstage view.\n\nIf you enable this policy setting, you can specify the number of unpinned entries to be between 0 and 20. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 5 unpinned items are displayed in the Recent Folders list.\n\nNote: If you want to prevent items from being added to the Recent Folders list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\place mru","registrySubPath":"max display","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_SetParametersForCNGContext","uniqueId":3948,"displayName":"Set parameters for CNG context","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_SetParametersForCNGContext;L_SetParametersForCNGContextID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the encryption parameters that should be used for the CNG context. \n\nIf you enable this policy setting, the parameters specified will be passed to the CNG context.\n\nIf you disable or do not configure this policy setting, the default CNG values will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_SetParametersForCNGContext;L_SetParametersForCNGContextID","uniqueId":3947,"displayName":"Parameters","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to specify the encryption parameters that should be used for the CNG context. \n\nIf you enable this policy setting, the parameters specified will be passed to the CNG context.\n\nIf you disable or do not configure this policy setting, the default CNG values will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\crypto","registrySubPath":"context","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_Showpopupmenubutton","uniqueId":3913,"displayName":"Show popup toolbar","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checked: Checks the option ''Show popup toolbar''. | Unchecked: Unchecks the option ''Show popup toolbar''.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"ssmenubutton","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_Showslideanimationwhilebrowsing","uniqueId":3923,"displayName":"Show slide animation while browsing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["General","Web Options...","Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\internet","registrySubPath":"showslideanimation","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_Slidenavigation;L_Addslidenavigationcontrols","uniqueId":3920,"displayName":"Add slide navigation controls","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["General","Web Options...","Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\internet","registrySubPath":"hidenavigation","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_Slidenavigation;L_Colors","uniqueId":3921,"displayName":"Colors","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"BrowserColors","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Browser colors","description":"","tags":[],"dependencyGroup":null},{"value":"PresentationSchemeTextColor","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Presentation colors (text color)","description":"","tags":[],"dependencyGroup":null},{"value":"PresentationSchemeAccentColor","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Presentation colors (accent color)","description":"","tags":[],"dependencyGroup":null},{"value":"WhiteTextOnBlack","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"White text on black","description":"","tags":[],"dependencyGroup":null},{"value":"BlackTextOnWhite","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Black text on white","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"BrowserColors","description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["General","Web Options...","Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\internet","registrySubPath":"framecolors","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_Slidenavigation","uniqueId":3922,"displayName":"Slide navigation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_Slidenavigation;L_Addslidenavigationcontrols","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_Slidenavigation;L_Colors","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["General","Web Options...","Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_SpecifyCNGHashAlgorithm","uniqueId":3950,"displayName":"Specify CNG hash algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_SpecifyCNGHashAlgorithm;L_SpecifyCNGHashAlgorithmDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the hash algorithm used.\n\nIf you enable this policy setting, the hashing algorithm selected will be used by CNG.\n\nIf you disable or do not configure this policy setting, the default CNG hash algorithm will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_SpecifyCNGHashAlgorithm;L_SpecifyCNGHashAlgorithmDropID","uniqueId":3949,"displayName":"Specify CNG hash algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"SHA1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA1","description":"","tags":[],"dependencyGroup":null},{"value":"SHA256","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA256","description":"","tags":[],"dependencyGroup":null},{"value":"SHA384","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA384","description":"","tags":[],"dependencyGroup":null},{"value":"SHA512","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA512","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"SHA256","description":"This policy setting allows you to specify the hash algorithm used.\n\nIf you enable this policy setting, the hashing algorithm selected will be used by CNG.\n\nIf you disable or do not configure this policy setting, the default CNG hash algorithm will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\crypto","registrySubPath":"hashalgorithm","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_SpecifyCNGRandomNumberGeneratorAlgorithm","uniqueId":3955,"displayName":"Specify CNG random number generator algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_SpecifyCNGRandomNumberGeneratorAlgorithm;L_SpecifyCNGRandomNumberGeneratorAlgorithmID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the CNG random number generator to use.\n\nIf you enable this policy setting, the random number generator specified will be used.\n\nIf you disable or do not configure this policy setting, the default random number generator will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_SpecifyCNGRandomNumberGeneratorAlgorithm;L_SpecifyCNGRandomNumberGeneratorAlgorithmID","uniqueId":3954,"displayName":"Random number generator:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to configure the CNG random number generator to use.\n\nIf you enable this policy setting, the random number generator specified will be used.\n\nIf you disable or do not configure this policy setting, the default random number generator will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\crypto","registrySubPath":"rngalgorithm","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_SpecifyCNGSaltLength","uniqueId":3957,"displayName":"Specify CNG salt length","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_SpecifyCNGSaltLength;L_SpecifyCNGSaltLengthSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specific the number of bytes of salt that should be used.\n\nIf you enable this policy setting, the bytes specified will be used.\n\nIf you disable or do not configure this policy setting, the default length or 16 will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_SpecifyCNGSaltLength;L_SpecifyCNGSaltLengthSpinID","uniqueId":3956,"displayName":"Number of bytes","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":5000},"dataType":"Integer"},"defaultValue":"16","description":"This policy setting allows you to specific the number of bytes of salt that should be used.\n\nIf you enable this policy setting, the bytes specified will be used.\n\nIf you disable or do not configure this policy setting, the default length or 16 will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\crypto","registrySubPath":"saltbytes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_SpecifyEncryptionCompatibility","uniqueId":3946,"displayName":"Specify encryption compatibility","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_SpecifyEncryptionCompatibility;L_SpecifyEncryptionCompatibilityDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the encrypted database compatibility.\n\nIf you enable this policy setting, the compatibility format specified will be applied during encryption for new files\n- Use legacy format\n- Use next generation format\n- All files save with next generation: All files save with the next generation format\n\nIf you disable or do not configure this policy setting, the default setting, \"Use next generation format,\" will be applied.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_SpecifyEncryptionCompatibility;L_SpecifyEncryptionCompatibilityDropID","uniqueId":3945,"displayName":"Specify encryption compatibility","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use legacy format","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use next generation format","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"All files save with next generation","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":2,"description":"This policy setting allows you to specify the encrypted database compatibility.\n\nIf you enable this policy setting, the compatibility format specified will be applied during encryption for new files\n- Use legacy format\n- Use next generation format\n- All files save with next generation: All files save with the next generation format\n\nIf you disable or do not configure this policy setting, the default setting, \"Use next generation format,\" will be applied.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\crypto","registrySubPath":"compatmode","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_StopCheckingAltTextAccessibilityInformation","uniqueId":3869,"displayName":"Stop checking for alt text accessibility information","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that objects such as images and shapes contain alt text.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that objects such as images and shapes contain alt text.\n\nIf you disable or do not configure this policy setting, objects will be checked for alternative text and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\accchecker","registrySubPath":"alttext","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_StopCheckingForBlankTableRowsAndColumns","uniqueId":3877,"displayName":"Stop checking for blank table rows and columns","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that blank rows and columns have not been inserted into tables.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that blank rows and columns have not been inserted into tables.\n\nIf you disable or do not configure this policy setting, tables will be checked for blank rows and columns and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\accchecker","registrySubPath":"blankrowcol","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_StopCheckingForMediaFilesCaptions","uniqueId":3872,"displayName":"Stop checking for media files which might need captions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from flagging media files that might need caption information.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from flagging media files that might need caption information.\n\nIf you disable or do not configure this policy setting, presentations will be scanned for media files and the results will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\accchecker","registrySubPath":"closedcaptions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_StopCheckingForMergedAndSplitCells","uniqueId":3878,"displayName":"Stop checking for merged and split cells","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that tables do not have merged or split cells.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that tables do not have merged or split cells.\n\nIf you disable or do not configure this policy setting, tables will be checked for merged and split cells and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\accchecker","registrySubPath":"simplestructure","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_StopCheckingMeaningfulOrderOfObjectsOnSlides","uniqueId":3881,"displayName":"Stop checking to ensure a meaningful order of objects on slides","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from checking if a slide has non-placeholder objects which might be read back out of order.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from checking if a slide has non-placeholder objects which might be read back out of order.\n\nIf you disable or do not configure this policy setting, slides will be checked for objects which might be read back out of order and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\accchecker","registrySubPath":"nonplaceholdershapes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_StopCheckingPresentationsAllowProgrammaticAccess","uniqueId":3882,"displayName":"Stop checking to ensure presentations allow programmatic access","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from checking to ensure that presentations have not blocked programmatic access through DRM.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from checking to ensure that presentations have not blocked programmatic access through DRM.\n\nIf you disable or do not configure this policy setting, presentations will be checked for programmatic access and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\accchecker","registrySubPath":"irm","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_StopCheckingSectionName","uniqueId":3873,"displayName":"Stop checking for Section with valid name","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from flagging section with default/untitled name.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from flagging section with default/untitled name.\n\nIf you disable or do not configure this policy setting, section will be scanned for valid name and the results will appear in the Accessibility Checker.\n      ","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\accchecker","registrySubPath":"hassectionname","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_StopCheckingTableAltTextAccessibilityInformation","uniqueId":3870,"displayName":"Stop checking for table alt text accessibility information","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that tables contain alt text.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that tables contain alt text.\n\nIf you disable or do not configure this policy setting, tables will be checked for alternative text and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\accchecker","registrySubPath":"tablealttext","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_StopCheckingTableHeaderAccessibilityInformation","uniqueId":3876,"displayName":"Stop checking for table header accessibility information","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that tables have a header row specified.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that tables have a header row specified.\n\nIf you disable or do not configure this policy setting, tables will be checked for header rows and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\accchecker","registrySubPath":"headerrow","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_StopCheckingTextContrast","uniqueId":3875,"displayName":"Stop checking for text color contrast","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from flagging text with low contrast and readability.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from flagging text with low contrast and readability.\n\nIf you disable or do not configure this policy setting, text will be scanned for color contrast and the results will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\accchecker","registrySubPath":"textcontrast","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_StopCheckingThatSlideTitlesExist","uniqueId":3879,"displayName":"Stop checking that slide titles exist","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that every slide has a title placeholder.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that every slide has a title placeholder.\n\nIf you disable or do not configure this policy setting, slides will be checked for titles and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\accchecker","registrySubPath":"hastitle","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_StopCheckingToEnsureEachSlideHasAUniqueTitle","uniqueId":3880,"displayName":"Stop checking to ensure each slide has a unique title","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that every slide has a unique title.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that every slide has a unique title.\n\nIf you disable or do not configure this policy setting, slide titles will be checked for uniqueness and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\accchecker","registrySubPath":"uniquetitle","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_StopCheckingToEnsureHyperlinkTextIsMeaningful","uniqueId":3871,"displayName":"Stop checking to ensure hyperlink text is meaningful","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that hyperlinks have meaningful text.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that hyperlinks have meaningful text.\n\nIf you disable or do not configure this policy setting, hyperlink text will be checked and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\accchecker","registrySubPath":"hyperlinktext","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_StopCheckingUniqueSectionName","uniqueId":3874,"displayName":"Stop checking for section with unique name","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that every section has a unique name.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that every section has a unique name.\n\nIf you disable or do not configure this policy setting, sections will be checked for unique names and any issues will appear in the Accessibility Checker.\n      ","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\accchecker","registrySubPath":"msoridpptacccheckerhasuniquesectionname","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustaccesstoVisualBasicProject","uniqueId":3970,"displayName":"Trust access to Visual Basic Project","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether automation clients such as Microsoft Visual Studio 2005 Tools for Microsoft Office (VSTO) can access the Visual Basic for Applications project system in the specified applications. VSTO projects require access to the Visual Basic for Applications project system in Excel, PowerPoint, and Word, even though the projects do not use Visual Basic for Applications. Design-time support of controls in both Visual Basic and C# projects depends on the Visual Basic for Applications project system in Word and Excel.\n\nIf you enable this policy setting, VSTO and other automation clients can access the Visual Basic for Applications project system in the specified applications. Users will not be able to change this behavior through the \"Trust access to the VBA project object model\" user interface option under the Macro Settings section of the Trust Center.\n\nIf you disable this policy setting, VSTO does not have programmatic access to VBA projects. In addition, the \"Trust access to the VBA project object model\" check box is cleared and users cannot change it.  Note: Disabling this policy setting prevents VSTO projects from interacting properly with the VBA project system in the selected application.\n\nIf you do not configure this policy setting, automation clients do not have programmatic access to VBA projects. Users can enable this by selecting the \"Trust access to the VBA project object model\" in the \"Macro Settings\" section of the Trust Center. However, doing so allows macros in any documents the user opens to access the core Visual Basic objects, methods, and properties, which represents a potential security hazard.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security","registrySubPath":"accessvbom","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc01;L_Allowsubfolders","uniqueId":4001,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location1","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc01;L_Datecolon","uniqueId":3999,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location1","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc01;L_Descriptioncolon","uniqueId":4000,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location1","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc01;L_Pathcolon","uniqueId":3998,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location1","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc01","uniqueId":4002,"displayName":"Trusted Location #1","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_TrustedLoc01;L_Pathcolon","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc01;L_Datecolon","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc01;L_Descriptioncolon","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc01;L_Allowsubfolders","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_TrustedLoc02;L_allowsubfolders7","uniqueId":4006,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location2","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc02;L_datecolon5","uniqueId":4004,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location2","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc02;L_descriptioncolon6","uniqueId":4005,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location2","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc02;L_pathcolon4","uniqueId":4003,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location2","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc02","uniqueId":4007,"displayName":"Trusted Location #2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_TrustedLoc02;L_pathcolon4","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc02;L_datecolon5","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc02;L_descriptioncolon6","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc02;L_allowsubfolders7","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_TrustedLoc03;L_allowsubfolders11","uniqueId":4011,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location3","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc03;L_datecolon9","uniqueId":4009,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location3","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc03;L_descriptioncolon10","uniqueId":4010,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location3","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc03;L_pathcolon8","uniqueId":4008,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location3","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc03","uniqueId":4012,"displayName":"Trusted Location #3","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_TrustedLoc03;L_pathcolon8","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc03;L_datecolon9","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc03;L_descriptioncolon10","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc03;L_allowsubfolders11","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_TrustedLoc04;L_allowsubfolders15","uniqueId":4016,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location4","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc04;L_datecolon13","uniqueId":4014,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location4","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc04;L_descriptioncolon14","uniqueId":4015,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location4","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc04;L_pathcolon12","uniqueId":4013,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location4","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc04","uniqueId":4017,"displayName":"Trusted Location #4","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_TrustedLoc04;L_pathcolon12","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc04;L_datecolon13","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc04;L_descriptioncolon14","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc04;L_allowsubfolders15","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_TrustedLoc05;L_allowsubfolders19","uniqueId":4021,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location5","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc05;L_datecolon17","uniqueId":4019,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location5","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc05;L_descriptioncolon18","uniqueId":4020,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location5","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc05;L_pathcolon16","uniqueId":4018,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location5","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc05","uniqueId":4022,"displayName":"Trusted Location #5","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_TrustedLoc05;L_pathcolon16","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc05;L_datecolon17","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc05;L_descriptioncolon18","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc05;L_allowsubfolders19","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_TrustedLoc06;L_allowsubfolders23","uniqueId":4026,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location6","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc06;L_datecolon21","uniqueId":4024,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location6","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc06;L_descriptioncolon22","uniqueId":4025,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location6","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc06;L_pathcolon20","uniqueId":4023,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location6","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc06","uniqueId":4027,"displayName":"Trusted Location #6","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_TrustedLoc06;L_pathcolon20","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc06;L_datecolon21","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc06;L_descriptioncolon22","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc06;L_allowsubfolders23","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_TrustedLoc07;L_allowsubfolders27","uniqueId":4031,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location7","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc07;L_datecolon25","uniqueId":4029,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location7","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc07;L_descriptioncolon26","uniqueId":4030,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location7","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc07;L_pathcolon24","uniqueId":4028,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location7","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc07","uniqueId":4032,"displayName":"Trusted Location #7","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_TrustedLoc07;L_pathcolon24","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc07;L_datecolon25","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc07;L_descriptioncolon26","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc07;L_allowsubfolders27","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_TrustedLoc08;L_allowsubfolders31","uniqueId":4036,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location8","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc08;L_datecolon29","uniqueId":4034,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location8","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc08;L_descriptioncolon30","uniqueId":4035,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location8","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc08;L_pathcolon28","uniqueId":4033,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location8","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc08","uniqueId":4037,"displayName":"Trusted Location #8","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_TrustedLoc08;L_pathcolon28","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc08;L_datecolon29","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc08;L_descriptioncolon30","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc08;L_allowsubfolders31","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_TrustedLoc09;L_allowsubfolders35","uniqueId":4041,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location9","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc09;L_datecolon33","uniqueId":4039,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location9","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc09;L_descriptioncolon34","uniqueId":4040,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location9","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc09;L_pathcolon32","uniqueId":4038,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location9","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc09","uniqueId":4042,"displayName":"Trusted Location #9","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_TrustedLoc09;L_pathcolon32","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc09;L_datecolon33","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc09;L_descriptioncolon34","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc09;L_allowsubfolders35","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_TrustedLoc10;L_allowsubfolders39","uniqueId":4046,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location10","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc10;L_datecolon37","uniqueId":4044,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location10","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc10;L_descriptioncolon38","uniqueId":4045,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location10","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc10;L_pathcolon36","uniqueId":4043,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location10","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc10","uniqueId":4047,"displayName":"Trusted Location #10","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_TrustedLoc10;L_pathcolon36","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc10;L_datecolon37","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc10;L_descriptioncolon38","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc10;L_allowsubfolders39","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_TrustedLoc11;L_allowsubfolders43","uniqueId":4051,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location11","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc11;L_datecolon41","uniqueId":4049,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location11","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc11;L_descriptioncolon42","uniqueId":4050,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location11","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc11;L_pathcolon40","uniqueId":4048,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location11","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc11","uniqueId":4052,"displayName":"Trusted Location #11","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_TrustedLoc11;L_pathcolon40","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc11;L_datecolon41","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc11;L_descriptioncolon42","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc11;L_allowsubfolders43","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_TrustedLoc12;L_allowsubfolders47","uniqueId":4056,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location12","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc12;L_datecolon45","uniqueId":4054,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location12","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc12;L_descriptioncolon46","uniqueId":4055,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location12","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc12;L_pathcolon44","uniqueId":4053,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location12","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc12","uniqueId":4057,"displayName":"Trusted Location #12","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_TrustedLoc12;L_pathcolon44","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc12;L_datecolon45","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc12;L_descriptioncolon46","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc12;L_allowsubfolders47","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_TrustedLoc13;L_allowsubfolders51","uniqueId":4061,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location13","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc13;L_datecolon49","uniqueId":4059,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location13","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc13;L_descriptioncolon50","uniqueId":4060,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location13","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc13;L_pathcolon48","uniqueId":4058,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location13","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc13","uniqueId":4062,"displayName":"Trusted Location #13","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_TrustedLoc13;L_pathcolon48","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc13;L_datecolon49","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc13;L_descriptioncolon50","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc13;L_allowsubfolders51","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_TrustedLoc14;L_allowsubfolders55","uniqueId":4066,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location14","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc14;L_datecolon53","uniqueId":4064,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location14","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc14;L_descriptioncolon54","uniqueId":4065,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location14","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc14;L_pathcolon52","uniqueId":4063,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location14","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc14","uniqueId":4067,"displayName":"Trusted Location #14","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_TrustedLoc14;L_pathcolon52","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc14;L_datecolon53","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc14;L_descriptioncolon54","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc14;L_allowsubfolders55","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_TrustedLoc15;L_allowsubfolders59","uniqueId":4071,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location15","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc15;L_datecolon57","uniqueId":4069,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location15","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc15;L_descriptioncolon58","uniqueId":4070,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location15","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc15;L_pathcolon56","uniqueId":4068,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location15","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc15","uniqueId":4072,"displayName":"Trusted Location #15","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_TrustedLoc15;L_pathcolon56","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc15;L_datecolon57","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc15;L_descriptioncolon58","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc15;L_allowsubfolders59","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_TrustedLoc16;L_allowsubfolders63","uniqueId":4076,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location16","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc16;L_datecolon61","uniqueId":4074,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location16","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc16;L_descriptioncolon62","uniqueId":4075,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location16","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc16;L_pathcolon60","uniqueId":4073,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location16","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc16","uniqueId":4077,"displayName":"Trusted Location #16","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_TrustedLoc16;L_pathcolon60","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc16;L_datecolon61","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc16;L_descriptioncolon62","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc16;L_allowsubfolders63","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_TrustedLoc17;L_allowsubfolders67","uniqueId":4081,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location17","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc17;L_datecolon65","uniqueId":4079,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location17","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc17;L_descriptioncolon66","uniqueId":4080,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location17","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc17;L_pathcolon64","uniqueId":4078,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location17","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc17","uniqueId":4082,"displayName":"Trusted Location #17","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_TrustedLoc17;L_pathcolon64","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc17;L_datecolon65","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc17;L_descriptioncolon66","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc17;L_allowsubfolders67","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_TrustedLoc18;L_allowsubfolders71","uniqueId":4086,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location18","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc18;L_datecolon69","uniqueId":4084,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location18","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc18;L_descriptioncolon70","uniqueId":4085,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location18","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc18;L_pathcolon68","uniqueId":4083,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location18","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc18","uniqueId":4087,"displayName":"Trusted Location #18","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_TrustedLoc18;L_pathcolon68","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc18;L_datecolon69","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc18;L_descriptioncolon70","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc18;L_allowsubfolders71","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_TrustedLoc19;L_allowsubfolders75","uniqueId":4091,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location19","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc19;L_datecolon73","uniqueId":4089,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location19","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc19;L_descriptioncolon74","uniqueId":4090,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location19","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc19;L_pathcolon72","uniqueId":4088,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location19","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc19","uniqueId":4092,"displayName":"Trusted Location #19","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_TrustedLoc19;L_pathcolon72","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc19;L_datecolon73","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc19;L_descriptioncolon74","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc19;L_allowsubfolders75","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_TrustedLoc20;L_allowsubfolders79","uniqueId":4096,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location20","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc20;L_datecolon77","uniqueId":4094,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location20","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc20;L_descriptioncolon78","uniqueId":4095,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location20","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc20;L_pathcolon76","uniqueId":4093,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted locations\\location20","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"ppt16;L_TrustedLoc20","uniqueId":4097,"displayName":"Trusted Location #20","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_TrustedLoc20;L_pathcolon76","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc20;L_datecolon77","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc20;L_descriptioncolon78","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_TrustedLoc20;L_allowsubfolders79","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_TurnOffFileFormatCompatiblityDialogForODP","uniqueId":3893,"displayName":"Suppress file format compatibility dialog box for OpenDocument Presentation format","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to enable or disable the file format compatibility dialog box when saving a file as an OpenDocument presentation file in Microsoft PowerPoint.\n\nIf you enable this policy, the file format compatibility dialog is displayed whenever you save as an OpenDocument presentation file in PowerPoint.\n\nIf you disable this policy, the file format compatibility dialog is not displayed when you save as an OpenDocument presentation file in PowerPoint.","supportedPlatforms":["Windows"],"tags":["Save","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"disablesaveaslosswarningopendocumentpresentation","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TurnOffFileSynchronizationViaSOAPOverHTTP","uniqueId":4126,"displayName":"Turn off file synchronization via SOAP over HTTP","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls file synchronization via SOAP over HTTP for PowerPoint.\n\nIf you enable this policy setting, file synchronization via SOAP over HTTP is turned off for PowerPoint.\n\nIf you disable or do not configure this policy setting this policy setting, file synchronization via SOAP over HTTP is turned on for PowerPoint.\n\nNote: Turning off file synchronization via SOAP over HTTP will also prevent co-authoring and adversely affect the behavior of SharePoint Workspaces.","supportedPlatforms":["Windows"],"tags":["Server Settings","Miscellaneous","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"fsshttpoffpowerpoint","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TurnOffFileValidation","uniqueId":3932,"displayName":"Turn off file validation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting allows you turn off the file validation feature.\n\nIf you enable this policy setting, file validation will be turned off.\n\nIf you disable or do not configure this policy setting, file validation will be turned on.  Office Binary Documents (97-2003) are checked to see if they conform against the file format schema before they are opened.","supportedPlatforms":["Windows"],"tags":["Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\filevalidation","registrySubPath":"enableonload","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TurnOffProtectedViewForAttachmentsOpenedFromOutlook","uniqueId":3928,"displayName":"Turn off Protected View for attachments opened from Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting allows you to determine if PowerPoint files in Outlook attachments open in Protected View.\n\nIf you enable this policy setting, Outlook attachments do not open in Protected View.\n\nIf you disable or do not configure this policy setting, Outlook attachments open in Protected View.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\protectedview","registrySubPath":"disableattachmentsinpv","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TurnOffRevisionTracking","uniqueId":4125,"displayName":"Turn off revision tracking","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off revision tracking in PowerPoint.\n\nBy default, revision tracking is on in presentations where revision tracking is supported.\n\nIf you enable this policy setting, revisions made to a presentation aren’t tracked or shown.\n\nIf you disable or don’t configure this policy setting, revisions made to a presentation are tracked and shown.","supportedPlatforms":["Windows"],"tags":["Co-authoring","Collaboration Settings","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\coauthoring","registrySubPath":"disablerevisiontracking","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TurnOffTrustedDocuments","uniqueId":3959,"displayName":"Turn off trusted documents","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off the trusted documents feature.  The trusted documents feature allows users to always enable active content in documents such as macros, ActiveX controls, data connections, etc. so that they are not prompted the next time they open the documents.  Trusted documents are exempt from security notifications.\n\nIf you enable this policy setting, you will turn off the trusted documents feature.  Users will receive a security prompt every time a document containing active content is opened.\n\nIf you disable or do not configure this policy setting, documents will be trusted when users enable content for a document, and users will not receive a security prompt.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted documents","registrySubPath":"disabletrusteddocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_TurnOffTrustedDocumentsOnTheNetwork","uniqueId":3958,"displayName":"Turn off Trusted Documents on the network","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off the trusted documents feature for documents opened from the network.\n\nIf you enable this policy setting, users will always see security notifications for active content such as macros, ActiveX controls, data connections, etc. for documents opened from the network.\n\nIf you disable or do not configure this policy setting, the trusted documents feature allows users to always allow active content in documents such as macros, ActiveX controls, data connections, etc. so that users are not prompted the next time they open the documents.  Trusted documents are exempt from security notifications.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\trusted documents","registrySubPath":"disablenetworktrusteddocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_UseNewKeyOnPasswordChange","uniqueId":3951,"displayName":"Use new key on password change","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to specify if a new encryption key is used when the password is changed.\n\nIf you enable or do not configure this policy setting, a new intermediate key is generated when the password is changed. This causes any extra key encryptors to be removed when the file is saved.\n\nIf you disable this policy setting, a new intermediate key is not generated when the password is changed.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\crypto","registrySubPath":"newkeyonpwdchange","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_Usesmartcutandpaste","uniqueId":3907,"displayName":"Use smart cut and paste","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"smartcutpaste","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_VBAWarningsPolicy;L_empty3","uniqueId":3965,"displayName":"VBA Macro Notification Settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable all with notification","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable all except digitally signed macros","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable all without notification","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable all macros (not recommended)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":3,"recommendation":"security"}],"defaultValue":2,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n \nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security","registrySubPath":"vbawarnings","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_VBAWarningsPolicy;L_VBADigSigTrustedPublishersStr","uniqueId":3966,"displayName":"Require macros to be signed by a trusted publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n \nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security","registrySubPath":"vbadigsigtrustedpublishers","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_VBAWarningsPolicy;L_VBAOnlyAllowDigSigWithCodeSigningEKUStr","uniqueId":3968,"displayName":"Require Extended Key Usage (EKU) for certificates from trusted publishers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n \nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security","registrySubPath":"vbarequiredigsigwithcodesigningeku","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_VBAWarningsPolicy;L_VBAOnlyAllowLMTrustedPublisherStr","uniqueId":3967,"displayName":"Block certificates from trusted publishers that are only installed in the current user certificate store","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n \nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security","registrySubPath":"vbarequirelmtrustedpublisher","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_VBAWarningsPolicy","uniqueId":3969,"displayName":"VBA Macro Notification Settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_VBAWarningsPolicy;L_empty3","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_VBAWarningsPolicy;L_VBADigSigTrustedPublishersStr","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_VBAWarningsPolicy;L_VBAOnlyAllowLMTrustedPublisherStr","logicalOperator":"exists","values":null},{"dependee":"ppt16;L_VBAWarningsPolicy;L_VBAOnlyAllowDigSigWithCodeSigningEKUStr","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n \nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_Verticalruler","uniqueId":3911,"displayName":"Show vertical ruler","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"verticalruler","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_WebPages","uniqueId":3983,"displayName":"Web Pages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"ppt16;L_WebPages;L_WebPagesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"ppt16;L_WebPages;L_WebPagesDropID","uniqueId":3982,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\security\\fileblock","registrySubPath":"htmlfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_Whenselectingautomaticallyselectentireword","uniqueId":3903,"displayName":"When selecting, automatically select entire word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"wordselection","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"ppt16;L_WindowsinTaskbar","uniqueId":3910,"displayName":"Show all windows in the Taskbar","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","PowerPoint Options","Microsoft PowerPoint 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\powerpoint\\options","registrySubPath":"showwindowsintaskbar","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_AllowTrustedLocationsOnTheNetwork","uniqueId":4314,"displayName":"Allow Trusted Locations on the network","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting controls whether trusted locations on the network can be used.\n\nIf you enable this policy setting, users can specify trusted locations on network shares or in other remote locations that are not under their direct control by clicking the \"Add new location\" button in the Trusted Locations section of the Trust Center. Content, code, and add-ins are allowed to load from trusted locations with minimal security and without prompting the user for permission.\n\nIf you disable this policy setting, the selected application ignores any network locations listed in the Trusted Locations section of the Trust Center. \n\nIf you also deploy Trusted Locations via Group Policy, you should verify whether any of them are remote locations. If any of them are remote locations and you do not allow remote locations via this policy setting, those policy keys that point to remote locations will be ignored on client computers.\n\nDisabling this policy setting does not delete any network locations from the Trusted Locations list, but causes disruption for users who add network locations to the Trusted Locations list. Users are also prevented from adding new network locations to the Trusted Locations list in the Trust Center.  We recommended that you do not enable this policy setting (as the \"Allow Trusted Locations on my network (not recommended)\" check box also states). Therefore, in practice, it should be possible to disable this policy setting in most situations without causing significant usability issues for most users.\n\nIf you do not enable this policy setting, users can select the \"Allow Trusted Locations on my network (not recommended)\" check box if desired and then specify trusted locations by clicking the \"Add new location\" button.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations","registrySubPath":"allownetworklocations","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_AutomaticallyAddNewItemsToTheGlobalProject","uniqueId":4164,"displayName":"Automatically add new items to the global project","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting specifies whether new items (views, tables, filters, and groups) are automatically added to the global project so they are available in all of the projects.\n\nIf you enable or do not configure this policy setting, new items will be automatically added to the global project.\n\nIf you disable this policy setting, new items will not be automatically added to the global project.","supportedPlatforms":["Windows"],"tags":["Show","View","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\view","registrySubPath":"automatically add items to the global","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_BlockAllUnmanagedAddins","uniqueId":4424,"displayName":"Block all unmanaged add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting blocks all add-ins that are not managed by the \"List of managed add-ins\" policy setting.\n\nIf you enable this policy setting, and the \"List of managed add-ins\" policy setting is also enabled, all add-ins are blocked except those that are configured as 1 (always enabled) or 2 (configurable by the user) in the \"List of managed add-ins\" policy setting.\n\nIf you disable or do not configure this policy setting, users can enable or disable any add-ins that are not managed by the \"List of managed add-ins\" policy setting.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\resiliency","registrySubPath":"restricttolist","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_BlockMacroExecutionFromInternet","uniqueId":4311,"displayName":"Block macros from running in Office files from the internet","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"\nThis policy setting allows you to block macros from running in Office files that come from the internet.\n\nIf you enable this policy setting, macros are blocked from running, even if \"Enable all macros\" is selected in the Macro Settings section of the Trust Center. Users will receive a notification that macros are blocked from running.\n\nThe exceptions when macros will be allowed to run are:\n- The Office file is saved to a Trusted Location.\n- The Office file was previously trusted by the user.\n- Macros are digitally signed and the matching Trusted Publisher certificate is installed on the device.\n\nIf you disable this policy setting, the settings configured in the Macro Settings section of the Trust Center determine whether macros run in Office files that come from the internet.\n\nIf you don’t configure this policy setting, macros will be blocked from running. Users will receive a notification telling them of the security risks of macros from the internet along with a link to learn more.\n\nFor more information, see https://go.microsoft.com/fwlink/p/?linkid=2185771.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security","registrySubPath":"blockcontentexecutionfrominternet","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_CacheLocation","uniqueId":4419,"displayName":"Local Project Cache Location","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_CacheLocation;L_cachelocation37","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the location path of the local project cache on the user's computer.","supportedPlatforms":["Windows"],"tags":["Tools | Local Project Cache","Save","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_CacheLocation;L_cachelocation37","uniqueId":4418,"displayName":"Local Project Cache Location","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Sets the location path of the local project cache on the user's computer.","supportedPlatforms":["Windows"],"tags":["Tools | Local Project Cache","Save","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\settings","registrySubPath":"cachelocation","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_CacheSizePerProfile","uniqueId":4421,"displayName":"Local Project Cache Size Limit in MB","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_CacheSizePerProfile;L_cachesizeperprofile38","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the size limit in MB of the local project cache.  This is applied per user profile. If this setting is enabled, the size of the cache will be set to the number specified. If this setting is disabled or not configured, users are able to set the cache size limit.","supportedPlatforms":["Windows"],"tags":["Tools | Local Project Cache","Save","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_CacheSizePerProfile;L_cachesizeperprofile38","uniqueId":4420,"displayName":"Local Project Cache Size Limit in MB","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":"undefined"},"dataType":"Integer"},"description":"Sets the size limit in MB of the local project cache.  This is applied per user profile. If this setting is enabled, the size of the cache will be set to the number specified. If this setting is disabled or not configured, users are able to set the cache size limit.","supportedPlatforms":["Windows"],"tags":["Tools | Local Project Cache","Save","Project Options","Microsoft Project 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\settings","registrySubPath":"cachesizeperprofile","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_calendartype0","uniqueId":4156,"displayName":"Calendar Type","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_calendartype0;L_calendartype1","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Allows you to set the default calendar type. You need to have the Complex Script and East Asian language packs installed on the operating system in order for this setting to be available. If you enable this setting, you can set the default calendar type. If you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calendar Type","View","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_calendartype0;L_calendartype1","uniqueId":4155,"displayName":"Calendar Type","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gregorian Calendar","description":"","tags":[],"dependencyGroup":null},{"value":6,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hijri Calendar","description":"","tags":[],"dependencyGroup":null},{"value":7,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Thai Buddhist","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Allows you to set the default calendar type. You need to have the Complex Script and East Asian language packs installed on the operating system in order for this setting to be available. If you enable this setting, you can set the default calendar type. If you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calendar Type","View","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\view","registrySubPath":"calendar type","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_ConfigureCNGCipherChainingMode","uniqueId":4295,"displayName":"Configure CNG cipher chaining mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_ConfigureCNGCipherChainingMode;L_ConfigureCNGCipherChainingModeDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the cipher chaining mode used.\n\nIf you enable this policy setting, the cipher chaining mode specified will be applied.\n\nIf you disable or do not configure this policy setting, Cipher Block Chaining (CBC) will be the default CNG cipher chaining mode used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_ConfigureCNGCipherChainingMode;L_ConfigureCNGCipherChainingModeDropID","uniqueId":4294,"displayName":"Configure CNG cipher chaining mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"ChainingModeCBC","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cipher Block Chaining (CBC)","description":"","tags":[],"dependencyGroup":null},{"value":"ChainingModeCFB","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cipher Feedback (CFB)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"ChainingModeCBC","description":"This policy setting allows you to configure the cipher chaining mode used.\n\nIf you enable this policy setting, the cipher chaining mode specified will be applied.\n\nIf you disable or do not configure this policy setting, Cipher Block Chaining (CBC) will be the default CNG cipher chaining mode used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\crypto","registrySubPath":"cipherchaining","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_DefaultCustomTab","uniqueId":4430,"displayName":"Show custom templates tab by default in Project on the Office Start screen and in File | New","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether custom templates (when they exist) show as the default tab in Project on the Office Start screen and in File | New. \n\nIf you enable this policy setting, users will the see custom templates tab as the default tab in Project on the Office Start screen and in File | New when templates exist (this can include Custom XML programmed templates, templates in the Workgroup templates path, templates in the Personal templates path, or SharePoint templates).\n\nIf you disable or do not configure this policy setting, users will see the Featured templates tab as the default tab in Project on the Office Start screen and in File | New, unless all Office-provided templates have been disabled.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\general","registrySubPath":"officestartdefaulttab","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_DefaultProjectCurrency","uniqueId":4163,"displayName":"Default Project Currency","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_DefaultProjectCurrency;L_defaultprojectcurrency4","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Allows you to manage whether users can set the default currency type for their new project plans. If you enable this setting, the default currency type is enforced for all new project plans. If this setting is disabled or not configured, users can set the default currency type for new project plans.","supportedPlatforms":["Windows"],"tags":["View","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_DefaultProjectCurrency;L_defaultprojectcurrency4","uniqueId":4162,"displayName":"Default Project Currency","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"AED","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"United Arab Emirates, Dirhams","description":"","tags":[],"dependencyGroup":null},{"value":"AFA","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Afghanistan, Afghanis","description":"","tags":[],"dependencyGroup":null},{"value":"ALL","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Albania, Leke","description":"","tags":[],"dependencyGroup":null},{"value":"AMD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Armenia, Drams","description":"","tags":[],"dependencyGroup":null},{"value":"AOA","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Angola, Kwanza","description":"","tags":[],"dependencyGroup":null},{"value":"ARS","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Argentina, Pesos","description":"","tags":[],"dependencyGroup":null},{"value":"AUD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Australia, Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"AWG","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Aruba, Guilders (also called Florins)","description":"","tags":[],"dependencyGroup":null},{"value":"AZM","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Azerbaijan, Manats","description":"","tags":[],"dependencyGroup":null},{"value":"BAM","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bosnia and Herzegovina, Convertible Marka","description":"","tags":[],"dependencyGroup":null},{"value":"BBD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Barbados, Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"BDT","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bangladesh, Taka","description":"","tags":[],"dependencyGroup":null},{"value":"BGN","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bulgaria, Leva","description":"","tags":[],"dependencyGroup":null},{"value":"BHD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bahrain, Dinars","description":"","tags":[],"dependencyGroup":null},{"value":"BIF","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Burundi, Francs","description":"","tags":[],"dependencyGroup":null},{"value":"BMD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bermuda, Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"BND","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Brunei Darussalam, Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"BOB","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bolivia, Bolivianos","description":"","tags":[],"dependencyGroup":null},{"value":"BRL","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Brazil, Brazil Real","description":"","tags":[],"dependencyGroup":null},{"value":"BSD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bahamas, Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"BTN","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bhutan, Ngultrum","description":"","tags":[],"dependencyGroup":null},{"value":"BWP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Botswana, Pulas","description":"","tags":[],"dependencyGroup":null},{"value":"BYR","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Belarus, Rubles","description":"","tags":[],"dependencyGroup":null},{"value":"BZD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Belize, Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"CAD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Canada, Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"CDF","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Congo (DRC)//Kinshasa, Congolese Francs","description":"","tags":[],"dependencyGroup":null},{"value":"CHF","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Switzerland, Francs","description":"","tags":[],"dependencyGroup":null},{"value":"CLP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Chile, Pesos","description":"","tags":[],"dependencyGroup":null},{"value":"CNY","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"China, Yuan Renminbi","description":"","tags":[],"dependencyGroup":null},{"value":"COP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Colombia, Pesos","description":"","tags":[],"dependencyGroup":null},{"value":"CRC","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Costa Rica, Colones","description":"","tags":[],"dependencyGroup":null},{"value":"CSD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Serbia, Dinars","description":"","tags":[],"dependencyGroup":null},{"value":"CUP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cuba, Pesos","description":"","tags":[],"dependencyGroup":null},{"value":"CVE","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cabo Verde, Escudos","description":"","tags":[],"dependencyGroup":null},{"value":"CZK","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Czech Republic, Koruny","description":"","tags":[],"dependencyGroup":null},{"value":"DJF","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Djibouti, Francs","description":"","tags":[],"dependencyGroup":null},{"value":"DKK","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Denmark, Kroner","description":"","tags":[],"dependencyGroup":null},{"value":"DOP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dominican Republic, Pesos","description":"","tags":[],"dependencyGroup":null},{"value":"DZD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Algeria, Algeria Dinars","description":"","tags":[],"dependencyGroup":null},{"value":"EGP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Egypt, Pounds","description":"","tags":[],"dependencyGroup":null},{"value":"ERN","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Eritrea, Nakfa","description":"","tags":[],"dependencyGroup":null},{"value":"ETB","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Ethiopia, Birr","description":"","tags":[],"dependencyGroup":null},{"value":"EUR","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Euro Member Countries, Euro","description":"","tags":[],"dependencyGroup":null},{"value":"FJD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Fiji, Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"FKP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Falkland Islands, Pounds","description":"","tags":[],"dependencyGroup":null},{"value":"GBP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"United Kingdom, Pounds","description":"","tags":[],"dependencyGroup":null},{"value":"GEL","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Georgia, Lari","description":"","tags":[],"dependencyGroup":null},{"value":"GGP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Guernsey, Pounds","description":"","tags":[],"dependencyGroup":null},{"value":"GHC","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Ghana, Cedis","description":"","tags":[],"dependencyGroup":null},{"value":"GIP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gibraltar, Pounds","description":"","tags":[],"dependencyGroup":null},{"value":"GMD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gambia, Dalasi","description":"","tags":[],"dependencyGroup":null},{"value":"GNF","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Guinea, Francs","description":"","tags":[],"dependencyGroup":null},{"value":"GTQ","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Guatemala, Quetzales","description":"","tags":[],"dependencyGroup":null},{"value":"GYD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Guyana, Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"HKD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hong Kong, Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"HNL","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Honduras, Lempiras","description":"","tags":[],"dependencyGroup":null},{"value":"HRK","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Croatia, Kuna","description":"","tags":[],"dependencyGroup":null},{"value":"HTG","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Haiti, Gourdes","description":"","tags":[],"dependencyGroup":null},{"value":"HUF","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hungary, Forint","description":"","tags":[],"dependencyGroup":null},{"value":"IDR","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Indonesia, Rupiahs","description":"","tags":[],"dependencyGroup":null},{"value":"ILS","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Israel, New Shekels","description":"","tags":[],"dependencyGroup":null},{"value":"IMP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Isle of Man, Pounds","description":"","tags":[],"dependencyGroup":null},{"value":"INR","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"India, Rupees","description":"","tags":[],"dependencyGroup":null},{"value":"IQD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Iraq, Dinars","description":"","tags":[],"dependencyGroup":null},{"value":"IRR","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Iran, Rials","description":"","tags":[],"dependencyGroup":null},{"value":"ISK","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Iceland, Kronur","description":"","tags":[],"dependencyGroup":null},{"value":"JEP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Jersey, Pounds","description":"","tags":[],"dependencyGroup":null},{"value":"JMD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Jamaica, Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"JOD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Jordan, Dinars","description":"","tags":[],"dependencyGroup":null},{"value":"JPY","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Japan, Yen","description":"","tags":[],"dependencyGroup":null},{"value":"KES","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kenya, Shillings","description":"","tags":[],"dependencyGroup":null},{"value":"KGS","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kyrgyzstan, Soms","description":"","tags":[],"dependencyGroup":null},{"value":"KHR","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cambodia, Riels","description":"","tags":[],"dependencyGroup":null},{"value":"KMF","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Comoros, Francs","description":"","tags":[],"dependencyGroup":null},{"value":"KPW","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"North Korea, Won","description":"","tags":[],"dependencyGroup":null},{"value":"KRW","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Korea, Won","description":"","tags":[],"dependencyGroup":null},{"value":"KWD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kuwait, Dinars","description":"","tags":[],"dependencyGroup":null},{"value":"KYD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cayman Islands, Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"KZT","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Kazakhstan, Tenge","description":"","tags":[],"dependencyGroup":null},{"value":"LAK","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Laos, Kips","description":"","tags":[],"dependencyGroup":null},{"value":"LBP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Lebanon, Pounds","description":"","tags":[],"dependencyGroup":null},{"value":"LKR","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sri Lanka, Rupees","description":"","tags":[],"dependencyGroup":null},{"value":"LRD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Liberia, Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"LSL","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Lesotho, Maloti","description":"","tags":[],"dependencyGroup":null},{"value":"LTL","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Lithuania, Litai","description":"","tags":[],"dependencyGroup":null},{"value":"LYD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Libya, Dinars","description":"","tags":[],"dependencyGroup":null},{"value":"MAD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Morocco, Dirhams","description":"","tags":[],"dependencyGroup":null},{"value":"MDL","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Moldova, Lei","description":"","tags":[],"dependencyGroup":null},{"value":"MGA","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Madagascar, Ariary","description":"","tags":[],"dependencyGroup":null},{"value":"MKD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"North Macedonia, Denars","description":"","tags":[],"dependencyGroup":null},{"value":"MMK","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Myanmar (Burma), Kyats","description":"","tags":[],"dependencyGroup":null},{"value":"MNT","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Mongolia, Tugriks","description":"","tags":[],"dependencyGroup":null},{"value":"MOP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Macao, Patacas","description":"","tags":[],"dependencyGroup":null},{"value":"MRO","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Mauritania, Ouguiyas","description":"","tags":[],"dependencyGroup":null},{"value":"MUR","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Mauritius, Rupees","description":"","tags":[],"dependencyGroup":null},{"value":"MVR","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Maldives (Maldive Islands), Rufiyaa","description":"","tags":[],"dependencyGroup":null},{"value":"MWK","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Malawi, Kwachas","description":"","tags":[],"dependencyGroup":null},{"value":"MXN","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Mexico, Pesos","description":"","tags":[],"dependencyGroup":null},{"value":"MYR","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Malaysia, Ringgits","description":"","tags":[],"dependencyGroup":null},{"value":"MZM","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Mozambique, Meticais","description":"","tags":[],"dependencyGroup":null},{"value":"NAD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Namibia, Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"NGN","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Nigeria, Nairas","description":"","tags":[],"dependencyGroup":null},{"value":"NIO","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Nicaragua, Cordobas","description":"","tags":[],"dependencyGroup":null},{"value":"NOK","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Norway, Krone","description":"","tags":[],"dependencyGroup":null},{"value":"NPR","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Nepal, Nepal Rupees","description":"","tags":[],"dependencyGroup":null},{"value":"NZD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"New Zealand, Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"OMR","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Oman, Rials","description":"","tags":[],"dependencyGroup":null},{"value":"PAB","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Panama, Balboa","description":"","tags":[],"dependencyGroup":null},{"value":"PEN","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Peru, Nuevos Soles","description":"","tags":[],"dependencyGroup":null},{"value":"PGK","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Papua New Guinea, Kina","description":"","tags":[],"dependencyGroup":null},{"value":"PHP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Philippines, Pesos","description":"","tags":[],"dependencyGroup":null},{"value":"PKR","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Pakistan, Rupees","description":"","tags":[],"dependencyGroup":null},{"value":"PLN","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Poland, Zlotych","description":"","tags":[],"dependencyGroup":null},{"value":"PYG","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Paraguay, Guarani","description":"","tags":[],"dependencyGroup":null},{"value":"QAR","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Qatar, Rials","description":"","tags":[],"dependencyGroup":null},{"value":"RON","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Romania, New Lei","description":"","tags":[],"dependencyGroup":null},{"value":"RUB","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Russia, Rubles","description":"","tags":[],"dependencyGroup":null},{"value":"RWF","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Rwanda, Rwanda Francs","description":"","tags":[],"dependencyGroup":null},{"value":"SAR","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Saudi Arabia, Riyals","description":"","tags":[],"dependencyGroup":null},{"value":"SBD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Solomon Islands, Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"SCR","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Seychelles, Rupees","description":"","tags":[],"dependencyGroup":null},{"value":"SDD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sudan, Dinars","description":"","tags":[],"dependencyGroup":null},{"value":"SEK","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sweden, Kronor","description":"","tags":[],"dependencyGroup":null},{"value":"SGD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Singapore, Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"SHP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Saint Helena, Pounds","description":"","tags":[],"dependencyGroup":null},{"value":"SLL","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sierra Leone, Leones","description":"","tags":[],"dependencyGroup":null},{"value":"SOS","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Somalia, Shillings","description":"","tags":[],"dependencyGroup":null},{"value":"SPL","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Seborga, Luigini","description":"","tags":[],"dependencyGroup":null},{"value":"SRD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Suriname, Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"STD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"São Tome and Principe, Dobras","description":"","tags":[],"dependencyGroup":null},{"value":"SVC","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"El Salvador, Colones","description":"","tags":[],"dependencyGroup":null},{"value":"SYP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Syria, Pounds","description":"","tags":[],"dependencyGroup":null},{"value":"SZL","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Swaziland, Emalangeni","description":"","tags":[],"dependencyGroup":null},{"value":"THB","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Thailand, Baht","description":"","tags":[],"dependencyGroup":null},{"value":"TJS","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tajikistan, Somoni","description":"","tags":[],"dependencyGroup":null},{"value":"TMM","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Turkmenistan, Manats","description":"","tags":[],"dependencyGroup":null},{"value":"TND","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tunisia, Dinars","description":"","tags":[],"dependencyGroup":null},{"value":"TOP","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tonga, Pa'anga","description":"","tags":[],"dependencyGroup":null},{"value":"TRY","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Turkey, Lira","description":"","tags":[],"dependencyGroup":null},{"value":"TTD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Trinidad and Tobago, Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"TVD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tuvalu, Tuvalu Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"TWD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Taiwan, New Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"TZS","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tanzania, Shillings","description":"","tags":[],"dependencyGroup":null},{"value":"UAH","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Ukraine, Hryvnia","description":"","tags":[],"dependencyGroup":null},{"value":"UGX","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Uganda, Shillings","description":"","tags":[],"dependencyGroup":null},{"value":"USD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"United States of America, Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"UYU","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Uruguay, Pesos","description":"","tags":[],"dependencyGroup":null},{"value":"UZS","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Uzbekistan, Sums","description":"","tags":[],"dependencyGroup":null},{"value":"VES","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Venezuela, Bolívar","description":"","tags":[],"dependencyGroup":null},{"value":"VND","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Vietnam, Dong","description":"","tags":[],"dependencyGroup":null},{"value":"VUV","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Vanuatu, Vatu","description":"","tags":[],"dependencyGroup":null},{"value":"WST","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Samoa, Tala","description":"","tags":[],"dependencyGroup":null},{"value":"XAF","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Communauté Financière Africaine BEAC, Francs","description":"","tags":[],"dependencyGroup":null},{"value":"XAG","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Silver, Ounces","description":"","tags":[],"dependencyGroup":null},{"value":"XAU","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gold, Ounces","description":"","tags":[],"dependencyGroup":null},{"value":"XCD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"East Caribbean Dollars","description":"","tags":[],"dependencyGroup":null},{"value":"XDR","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"International Monetary Fund (IMF) Special Drawing Rights","description":"","tags":[],"dependencyGroup":null},{"value":"XOF","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Communauté Financière Africaine BCEAO, Francs","description":"","tags":[],"dependencyGroup":null},{"value":"XPD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Palladium Ounces","description":"","tags":[],"dependencyGroup":null},{"value":"XPF","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Comptoirs Français du Pacifique Francs","description":"","tags":[],"dependencyGroup":null},{"value":"XPT","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Platinum, Ounces","description":"","tags":[],"dependencyGroup":null},{"value":"YER","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yemen, Rials","description":"","tags":[],"dependencyGroup":null},{"value":"ZAR","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"South Africa, Rand","description":"","tags":[],"dependencyGroup":null},{"value":"ZMK","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Zambia, Kwacha","description":"","tags":[],"dependencyGroup":null},{"value":"ZWD","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Zimbabwe, Zimbabwe Dollars","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"AED","description":"Allows you to manage whether users can set the default currency type for their new project plans. If you enable this setting, the default currency type is enforced for all new project plans. If this setting is disabled or not configured, users can set the default currency type for new project plans.","supportedPlatforms":["Windows"],"tags":["View","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\view","registrySubPath":"currency","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_Disableallapplicationextensions","uniqueId":4308,"displayName":"Disable all application add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting disables all add-ins for the specified Office 2016 applications.\n     \nIf you enable this policy setting, all add-ins for the specified Office 2016 applications are disabled.\n\nIf you disable or do not configure this policy setting, all add-ins for the specified Office 2016 applications are allowed to run without notifying the users, except if application add-ins are required to be signed by Trusted Publishers.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security","registrySubPath":"disablealladdins","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_DisableInternalIDMatching","uniqueId":4278,"displayName":"Disable Internal ID Matching","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Prevent internal id matching. If you enable this setting, Project will not use internal identifiers to match different-language or renamed Organizer items between projects. If this setting is disabled or not configured, internal identifiers will be used to match different-language or renamed Organizer items between projects.","supportedPlatforms":["Windows"],"tags":["Interface","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\interface","registrySubPath":"disable internal id matching","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_DisableOfficeStartProject","uniqueId":4427,"displayName":"Disable the Office Start screen for Project","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the Office Start screen appears on boot for Project.\n\nIf you enable this policy setting, users will not see the Office Start screen when they boot Project.\n\nIf you disable or do not configure this policy setting, users will see the Office Start screen when they boot Project.\n\nNote: This policy setting is overridden by the policy setting \"Microsoft Office 2016 > Miscellaneous > Disable the Office Start screen for all Office applications\" if that policy setting is set.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\general","registrySubPath":"disableboottoofficestart","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_DisableTrustBarNotificationforunsigned","uniqueId":4313,"displayName":"Disable Trust Bar Notification for unsigned application add-ins and block them","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable such add-ins without notification. This policy setting only applies if you enable the \"Require that application add-ins are signed by Trusted Publisher\" policy setting, which prevents users from changing this policy setting.\n\nIf you enable this policy setting, applications automatically disable unsigned add-ins without informing users.\n \nIf you disable this policy setting, if this application is configured to require that all add-ins be signed by a trusted publisher, any unsigned add-ins the application loads will be disabled and the application will display the Trust Bar at the top of the active window. The Trust Bar contains a message that informs users about the unsigned add-in.\n\nIf you do not configure this policy setting, the disable behavior applies, and in addition, users can configure this requirement themselves in the \"Add-ins\" category of the Trust Center for the application.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security","registrySubPath":"notbpromptunsignedaddin","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_DisableTrustedLoc","uniqueId":4315,"displayName":"Disable all trusted locations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows administrators to disable all trusted locations in the specified applications. Trusted locations specified in the Trust Center are used to define file locations that are assumed to be safe. Content, code, and add-ins are allowed to load from trusted locations with a minimal amount of security, without prompting the users for permission. If a dangerous file is opened from a trusted location, it will not be subject to standard security measures and could harm users' computers or data.\n\nIf you enable this policy setting, all trusted locations (those specified in the Trust Center) in the specified applications are ignored, including any trusted locations established by Office 2016 during setup, deployed to users using Group Policy, or added by users themselves.  Users will be prompted again when opening files from trusted locations.\n\nIf you disable or do not configure this policy setting, all trusted locations (those specified in the Trust Center) in the specified applications are assumed to be safe.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations","registrySubPath":"alllocationsdisabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_DisplayDeveloperTab","uniqueId":4180,"displayName":"Display Developer tab in the Ribbon","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the Developer tab will be displayed in the Ribbon.\n\nIf you enable this policy setting, the Developer tab will be displayed in the Ribbon.\n\nIf you disable this policy setting, the Developer tab will not be displayed in the Ribbon.\n\nIf you do not configure this policy setting, the Developer tab will not be displayed in the Ribbon, but its visibility can be changed via a setting in the application Options dialog box.","supportedPlatforms":["Windows"],"tags":["Customize Ribbon","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\settings","registrySubPath":"developertools","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_EnableuntrustedintranetzoneaccesstoProjectServer","uniqueId":4154,"displayName":"Enable untrusted intranet zone access to Project server","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Allows users to access Project Server Web sites and Workspaces that have not been added to their trusted intranet zones. If you enable this setting, users can access Project Server and Microsoft SharePoint Foundation sites that are not in their trusted intranet zones. If this setting is disabled or not configured, users are required to add the Project Server and Microsoft SharePoint Foundation sites to their trusted intranet site zones.","supportedPlatforms":["Windows"],"tags":["Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security","registrySubPath":"trustwss","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_KeepTasksOnNearestWorkingDay","uniqueId":4231,"displayName":"Keep tasks on nearest working day","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting will enable a constraint to be applied to tasks when they are toggled from Manually Scheduled Mode to Automatically Scheduled Mode, allowing the task date to be as close to the user-entered date as possible.\n\nIf you enable this policy setting, the task date will be as close to the user-entered date as possible when tasks are toggled from Manually Scheduled Mode to Automatically Scheduled Mode.\n\nIf you disable or do not configure this policy setting, the task date will not to be as close to the user-entered date when tasks are toggled from Manually Scheduled Mode to Automatically Scheduled Mode.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\scheduling","registrySubPath":"keeptaskonnearestworkingtimewhenmadeautoscheduled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_Legacyfileformats;L_Empty","uniqueId":4290,"displayName":"Previous-version file formats","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not open or save","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt when opening and saving","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow opening and saving","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Allows you manage whether users can open or save files in Project with file formats from previous versions or file formats that are not default. By default, users can not open or save files with formats from previous versions.","supportedPlatforms":["Windows"],"tags":["Security","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security","registrySubPath":"legacyfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_Legacyfileformats","uniqueId":4291,"displayName":"Previous-version file formats","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_Legacyfileformats;L_Empty","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Allows you manage whether users can open or save files in Project with file formats from previous versions or file formats that are not default. By default, users can not open or save files with formats from previous versions.","supportedPlatforms":["Windows"],"tags":["Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_ListOfManagedAddins","uniqueId":4426,"displayName":"List of managed add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_ListOfManagedAddins;L_ListOfManagedAddins2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify which add-ins are always enabled, always disabled (blocked), or configurable by the user. To block add-ins that are not managed by this policy setting, you must also configure the \"Block all unmanaged add-ins\" policy setting.\n\nTo enable this policy setting, provide the following information for each add-in:\n\nIn \"Value name,\" specify the programmatic identifier (ProgID) for COM add-ins.\n\nTo obtain the ProgID for an add-in, use Registry Editor on the client computer where the add-in is installed to locate key names under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Office\\MS Project\\Addins or HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Office\\MS Project\\Addins.\n\nYou can also obtain the ProgID of an add-in by using Office Telemetry Dashboard.\n\nIn \"Value,\" specify the value as follows:\n\nTo specify that an add-in is always disabled (blocked), type 0.\n\nTo specify that an add-in is always enabled, type 1.\n\nTo specify that an add-in is configurable by the user and not blocked by the \"Block all unmanaged add-ins\" policy setting when enabled, type 2.\n\nIf you disable or do not enable this policy setting, the list of managed add-ins is deleted. If the \"Block all unmanaged add-ins\" policy setting is enabled, then all add-ins are blocked.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Project 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\resiliency\\addinlist","registrySubPath":"policyon","enforcedValues":{"enabled":1}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\resiliency\\addinlist","registrySubPath":"policyon","enforcedValues":{"enabled":1}}]}}},{"id":"proj16;L_ListOfManagedAddins;L_ListOfManagedAddins2","uniqueId":4425,"displayName":"List of managed add-ins","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to specify which add-ins are always enabled, always disabled (blocked), or configurable by the user. To block add-ins that are not managed by this policy setting, you must also configure the \"Block all unmanaged add-ins\" policy setting.\n\nTo enable this policy setting, provide the following information for each add-in:\n\nIn \"Value name,\" specify the programmatic identifier (ProgID) for COM add-ins.\n\nTo obtain the ProgID for an add-in, use Registry Editor on the client computer where the add-in is installed to locate key names under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Office\\MS Project\\Addins or HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Office\\MS Project\\Addins.\n\nYou can also obtain the ProgID of an add-in by using Office Telemetry Dashboard.\n\nIn \"Value,\" specify the value as follows:\n\nTo specify that an add-in is always disabled (blocked), type 0.\n\nTo specify that an add-in is always enabled, type 1.\n\nTo specify that an add-in is configurable by the user and not blocked by the \"Block all unmanaged add-ins\" policy setting when enabled, type 2.\n\nIf you disable or do not enable this policy setting, the list of managed add-ins is deleted. If the \"Block all unmanaged add-ins\" policy setting is enabled, then all add-ins are blocked.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Project 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\resiliency\\addinlist","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_MRUTemplateListLength","uniqueId":4423,"displayName":"Most Recently Used Template List Length","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_MRUTemplateListLength;L_mrutemplatelistlength39","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This setting determines the length of the recently used templates list in the New Document task pane (File New...). The maximum value is 9 and the minimum value is 0. This setting applies only applies to Project.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_MRUTemplateListLength;L_mrutemplatelistlength39","uniqueId":4422,"displayName":"Most Recently Used Template List Length","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":9},"dataType":"Integer"},"description":"This setting determines the length of the recently used templates list in the New Document task pane (File New...). The maximum value is 9 and the minimum value is 0. This setting applies only applies to Project.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Project 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\general","registrySubPath":"recenttemplateslist","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PersonalTemplatesPath","uniqueId":4429,"displayName":"Personal templates path for Project","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PersonalTemplatesPath;L_PersonalTemplatesPath","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the location of a user's personal templates. \n\nIf you enable this policy setting, users will see any templates they have saved in the specified location in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will change to be the specified location. \n\nIf you disable or do not configure this policy setting, users will not see templates they have saved in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will be their document save location.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PersonalTemplatesPath;L_PersonalTemplatesPath","uniqueId":4428,"displayName":"Personal templates path for Project","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting specifies the location of a user's personal templates. \n\nIf you enable this policy setting, users will see any templates they have saved in the specified location in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will change to be the specified location. \n\nIf you disable or do not configure this policy setting, users will not see templates they have saved in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will be their document save location.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\save","registrySubPath":"personaltemplates","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_PjActualCostsCalc","uniqueId":4260,"displayName":"Actual costs are always calculated by Microsoft Project","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Specifies that Project calculates actual costs automatically, based upon resource rates, per-use resource costs, and fixed task costs.\n\nIf you enable this setting, Project will automatically calculate actual costs.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calculation options for 'Project1'","Calculation","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calculation","registrySubPath":"actual costs are always calculated by microsoft office project","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjAddSpace","uniqueId":4202,"displayName":"Add space before label","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Adds a space between numbers and time unit labels.\n      \nIf you enable this setting, a space is displayed between numbers and the time unit label.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["View options for time units in 'Project1'","Edit","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\edit","registrySubPath":"spacebeforetimelabel","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjAllowCellDragDrop","uniqueId":4186,"displayName":"Allow cell drag and drop","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Allow fields in sheets to be moved using the mouse.\nIf you enable this setting, users can move rows and fields to new locations using the mouse.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Edit options for Microsoft Project","Edit","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\edit","registrySubPath":"drag and drop","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjAndMoveCompleted","uniqueId":4251,"displayName":"And move end of completed parts forward to status date","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Moves the completed portion of a task forward to finish at the status date.\n\nIf you enable this setting, the completed portion of the task moves forward to finish at the status date.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calculation options for 'Project1'","Calculation","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calculation","registrySubPath":"andmovecompleted","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjAndMoveRemaining","uniqueId":4253,"displayName":"And move start of remaining parts back to status date","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Moves the remaining portion of a task back to start at the status date.\n\nIf you enable this setting, the remaining portion of the task moves back to start at the status date.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calculation options for 'Project1'","Calculation","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calculation","registrySubPath":"andmoveremaining","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjAsktoUpdate","uniqueId":4188,"displayName":"Ask to update automatic links","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Prompts the user to update linked objects whenever they open a file containing OLE links, if the source has changed.\n      \nIf you enable this setting, users are prompted to update linked objects whose source has changed whenever they open a file containing OLE links.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Edit options for Microsoft Project","Edit","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\edit","registrySubPath":"prompt for update links","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjAssignmentUnits","uniqueId":4225,"displayName":"Show assignment units as","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjAssignmentUnits;L_pjassignmentunits21","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Shows resource assignments units as a decimal or percentage.\n\nIf you enable this setting, resource assignment units will be set to the option you choose from the list.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Schedule options for Microsoft Project","Schedule","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjAssignmentUnits;L_pjassignmentunits21","uniqueId":4224,"displayName":"Show assignment units as","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Percentage","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Decimal","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Shows resource assignments units as a decimal or percentage.\n\nIf you enable this setting, resource assignment units will be set to the option you choose from the list.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Schedule options for Microsoft Project","Schedule","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\scheduling","registrySubPath":"show assignment units as a:","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjAutoAddNew","uniqueId":4181,"displayName":"Automatically add new resources and tasks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Automatically adds new resources to the resource pool and assigns them default values whenever a new resource name or new resource's initials are added.\n      \nIf you enable this setting, new resources and tasks are automatically inserted into the project.\n\nIf you disable this setting, users are alerted whenever a new resource or task is created when making a new assignment.\n\nIf you do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["General options for 'Project1'","General","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\general","registrySubPath":"auto add resources","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjAutoCalc","uniqueId":4247,"displayName":"Automatic Calculation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Specifies that calculations should be done automatically as soon as a change is made.\n\nIf you enable this setting, calculations will be made after every change to the project.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calculation options for Microsoft Project","Calculation","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calculation","registrySubPath":"auto calc","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjAutolinkTasks","uniqueId":4242,"displayName":"Autolink inserted or moved tasks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting automatically links tasks when you cut, move, or insert them.\n\nIf you enable this policy setting, tasks will automatically be linked when you cut, move, or insert them.\n\nIf you disable or do not configure this policy setting, tasks will not automatically be linked when you cut, move, or insert them.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\scheduling","registrySubPath":"edit with auto link","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjAutomaticSaveOption","uniqueId":4276,"displayName":"Save Active Project only","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"Saves only the active project at the interval you specify.  This setting is only used by Project if Auto Save is turned on.\n\nIf you enable this setting, Project will only save the active project at specified intervals.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Auto Save Options","Save","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\save","registrySubPath":"automaticsaveoption","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjAutomaticSavePrompt","uniqueId":4277,"displayName":"Prompt before saving","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Specifies whether Project should prompt the user before saving their project as a result of the Auto Save function.\n\nIf you enable this setting, users will be prompted before their project is automatically saved.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Auto Save Options","Save","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\save","registrySubPath":"automaticsaveprompt","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjCalcAll","uniqueId":4248,"displayName":"Calculate all open projects","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Specifies that Project should recalculate all open projects.\n\nIf you enable this setting, all open projects will be recalculated anytime Project does a calculation.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calculation options for Microsoft Project","Calculation","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calculation","registrySubPath":"calcall","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjCalcMultipleCriticalPaths","uniqueId":4264,"displayName":"Calculate multiple critical paths","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Specifies that Project should calculate and display a critical path for each independent network of tasks within the project.\n\nIf you enable this setting, Project will calculate multiple critical paths.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calculation options for 'Project1'","Calculation","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calculation","registrySubPath":"calculate multiple critical paths","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjChangeDurationOOUI","uniqueId":4280,"displayName":"Edits to work, units or duration","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Specifies that the feedback triangle should appear in a corner of a Task Name field if you change the task's start date or finish date.\n\nIf you enable this setting, a feedback triangle is displayed in the corner of the Task Name field if the user changes the task's start or finish date.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Show indicators and Option butons for","Interface","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\interface","registrySubPath":"changedurationooui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjCritIfLess","uniqueId":4266,"displayName":"Tasks are critical if slack is less than or equal to","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjCritIfLess;L_pjcritifless29","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the number of days of slack Project uses to determine critical tasks.\n\nIf you enable this setting, tasks are marked as critical if the slack is less than or equal to the value you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calculation options for 'Project1'","Calculation","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjCritIfLess;L_pjcritifless29","uniqueId":4265,"displayName":"Tasks are critical if slack is less than or equal to","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":9999},"dataType":"Integer"},"description":"Specifies the number of days of slack Project uses to determine critical tasks.\n\nIf you enable this setting, tasks are marked as critical if the slack is less than or equal to the value you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calculation options for 'Project1'","Calculation","Project Options","Microsoft Project 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calculation","registrySubPath":"show as critical if slack","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjDateFormat","uniqueId":4161,"displayName":"Date Format","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjDateFormat;L_pjdateformat3","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the format for displaying dates.  Some information, such as time formats and the date separator, is set through the Control Panel.\n      \nIf you enable this setting, dates are displayed in the format you set.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["View","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjDateFormat;L_pjdateformat3","uniqueId":4160,"displayName":"Date Format","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1/31/00 12:33 PM","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1/31/00","description":"","tags":[],"dependencyGroup":null},{"value":20,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1/31/2000","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"January 31, 2000 12:33 PM","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"January 31, 2000","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Jan 31 12:33 PM","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Jan 31 '00","description":"","tags":[],"dependencyGroup":null},{"value":6,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"January 31","description":"","tags":[],"dependencyGroup":null},{"value":7,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Jan 31","description":"","tags":[],"dependencyGroup":null},{"value":8,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Mon 1/31/00 12:33 PM","description":"","tags":[],"dependencyGroup":null},{"value":9,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Mon 1/31/00","description":"","tags":[],"dependencyGroup":null},{"value":10,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Mon Jan 31, '00","description":"","tags":[],"dependencyGroup":null},{"value":11,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Mon 12:33 PM","description":"","tags":[],"dependencyGroup":null},{"value":15,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Mon Jan 31","description":"","tags":[],"dependencyGroup":null},{"value":16,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Mon 1/31","description":"","tags":[],"dependencyGroup":null},{"value":17,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Mon 31","description":"","tags":[],"dependencyGroup":null},{"value":12,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1/31","description":"","tags":[],"dependencyGroup":null},{"value":13,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"31","description":"","tags":[],"dependencyGroup":null},{"value":14,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"12:33 PM","description":"","tags":[],"dependencyGroup":null},{"value":18,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"W1/1","description":"","tags":[],"dependencyGroup":null},{"value":19,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"W1/1/00 12:33 PM","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Specifies the format for displaying dates.  Some information, such as time formats and the date separator, is set through the Control Panel.\n      \nIf you enable this setting, dates are displayed in the format you set.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["View","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\view","registrySubPath":"date format","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjDaysPerMonth","uniqueId":4222,"displayName":"Days per month","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjDaysPerMonth;L_pjdayspermonth20","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines the number of days that you want Project to assign to a task when you enter a duration of a month.\n\nIf you enable this setting, month-long tasks will be assigned the number of days that you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calendar","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjDaysPerMonth;L_pjdayspermonth20","uniqueId":4221,"displayName":"Days per month","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":100},"dataType":"Integer"},"description":"Defines the number of days that you want Project to assign to a task when you enter a duration of a month.\n\nIf you enable this setting, month-long tasks will be assigned the number of days that you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calendar","Project Options","Microsoft Project 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calendar","registrySubPath":"default days/month","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjDays","uniqueId":4195,"displayName":"Days","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjDays;L_pjdays10","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the label for days.\n  \nIf you enable this setting, days are displayed with the specified label.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["View options for time units in 'Project1'","Edit","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjDays;L_pjdays10","uniqueId":4194,"displayName":"Days","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"d","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"dy","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"day","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the label for days.\n  \nIf you enable this setting, days are displayed with the specified label.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["View options for time units in 'Project1'","Edit","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\edit","registrySubPath":"daylabeldisplay","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjDefaultEndTime","uniqueId":4216,"displayName":"Default end time","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjDefaultEndTime;L_PjDefaultEndTime2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the finish time that Project assigns to tasks by default when you enter a finish date without specifying a time.\n\nIf you enable this setting, new tasks where the user does not enter an end time will have the end time that you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calendar","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjDefaultEndTime;L_PjDefaultEndTime2","uniqueId":4215,"displayName":"Default end time (Minutes after 12am * 10)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":14400},"dataType":"Integer"},"description":"Specifies the finish time that Project assigns to tasks by default when you enter a finish date without specifying a time.\n\nIf you enable this setting, new tasks where the user does not enter an end time will have the end time that you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calendar","Project Options","Microsoft Project 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calendar","registrySubPath":"default end time","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjDefaultFixedAccrual","uniqueId":4263,"displayName":"Default fixed costs accrual","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjDefaultFixedAccrual;L_pjdefaultfixedaccrual28","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies how Project sets the fixed cost accrual for new tasks.\n\nIf you enable this setting, new tasks will accrue fixed cost according to the specification you made.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calculation options for 'Project1'","Calculation","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjDefaultFixedAccrual;L_pjdefaultfixedaccrual28","uniqueId":4262,"displayName":"Default fixed costs accrual","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Start","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prorated","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"End","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Specifies how Project sets the fixed cost accrual for new tasks.\n\nIf you enable this setting, new tasks will accrue fixed cost according to the specification you made.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calculation options for 'Project1'","Calculation","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calculation","registrySubPath":"default fixed costs accrual","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjDefaultOtime","uniqueId":4185,"displayName":"Default overtime rate","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjDefaultOtime;L_pjdefaultotime7","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the overtime pay rate for new resources.\n      \nIf you enable this setting, all new resources will use the specified overtime pay rate\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["General options for 'Project1'","General","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjDefaultOtime;L_pjdefaultotime7","uniqueId":4184,"displayName":"Default overtime rate","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specifies the overtime pay rate for new resources.\n      \nIf you enable this setting, all new resources will use the specified overtime pay rate\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["General options for 'Project1'","General","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\general","registrySubPath":"ovt. rate","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_PjDefaultStartTime","uniqueId":4214,"displayName":"Default start time","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjDefaultStartTime;L_PjDefaultStartTime2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the start time that Project assigns to tasks by default when you enter a start date without specifying a time.\n\nIf you enable this setting, new tasks where the user does not enter a start time will use the start time that you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calendar","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjDefaultStartTime;L_PjDefaultStartTime2","uniqueId":4213,"displayName":"Default start time (Minutes after 12am * 10)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":"undefined","maximum":14400},"dataType":"Integer"},"description":"Specifies the start time that Project assigns to tasks by default when you enter a start date without specifying a time.\n\nIf you enable this setting, new tasks where the user does not enter a start time will use the start time that you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calendar","Project Options","Microsoft Project 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calendar","registrySubPath":"default start time","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjDefaultStdRate","uniqueId":4183,"displayName":"Default standard rate","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjDefaultStdRate;L_pjdefaultstdrate6","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the standard pay rate for new resources.\n      \nIf you enable this setting, all new resources will use the specified standard pay rate.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["General options for 'Project1'","General","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjDefaultStdRate;L_pjdefaultstdrate6","uniqueId":4182,"displayName":"Default standard rate","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specifies the standard pay rate for new resources.\n      \nIf you enable this setting, all new resources will use the specified standard pay rate.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["General options for 'Project1'","General","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\general","registrySubPath":"std. rate","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_PjDefaultTaskTypes","uniqueId":4240,"displayName":"Default task type","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjDefaultTaskTypes;L_pjdefaulttasktypes25","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the default task type for new tasks.\n\nIf you enable this setting, new tasks will be set to the type that you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjDefaultTaskTypes;L_pjdefaulttasktypes25","uniqueId":4239,"displayName":"Default task type","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Fixed Duration","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Fixed Units","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Fixed Work","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Specifies the default task type for new tasks.\n\nIf you enable this setting, new tasks will be set to the type that you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\scheduling","registrySubPath":"default task type","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjDefaultView","uniqueId":4159,"displayName":"Default View","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjDefaultView;L_pjdefaultview2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the view that Project displays at startup.\n      \nIf you enable this setting, you can set the default view that is displayed at startup.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["View","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjDefaultView;L_pjdefaultview2","uniqueId":4158,"displayName":"Default View","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"Bar Rollup","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bar Rollup","description":"","tags":[],"dependencyGroup":null},{"value":"Calendar","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Calendar","description":"","tags":[],"dependencyGroup":null},{"value":"Descriptive Network Diagram","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Descriptive Network Diagram","description":"","tags":[],"dependencyGroup":null},{"value":"Detail Gantt","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Detail Gantt","description":"","tags":[],"dependencyGroup":null},{"value":"Gantt Chart","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gantt Chart","description":"","tags":[],"dependencyGroup":null},{"value":"Leveling Gantt","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Leveling Gantt","description":"","tags":[],"dependencyGroup":null},{"value":"Milestone Date Rollup","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Milestone Date Rollup","description":"","tags":[],"dependencyGroup":null},{"value":"Milestone Rollup","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Milestone Rollup","description":"","tags":[],"dependencyGroup":null},{"value":"Network Diagram","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Network Diagram","description":"","tags":[],"dependencyGroup":null},{"value":"Relationship Diagram","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Relationship Diagram","description":"","tags":[],"dependencyGroup":null},{"value":"Resource Allocation","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Resource Allocation","description":"","tags":[],"dependencyGroup":null},{"value":"Resource Form","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Resource Form","description":"","tags":[],"dependencyGroup":null},{"value":"Resource Graph","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Resource Graph","description":"","tags":[],"dependencyGroup":null},{"value":"Resource Name Form","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Resource Names Form","description":"","tags":[],"dependencyGroup":null},{"value":"Resource Sheet","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Resource Sheet","description":"","tags":[],"dependencyGroup":null},{"value":"Resource Usage","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Resource Usage","description":"","tags":[],"dependencyGroup":null},{"value":"Task Details Form","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Task Details Form","description":"","tags":[],"dependencyGroup":null},{"value":"Task Entry","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Task Entry","description":"","tags":[],"dependencyGroup":null},{"value":"Task Form","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Task Form","description":"","tags":[],"dependencyGroup":null},{"value":"Task Name Form","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Task Name Form","description":"","tags":[],"dependencyGroup":null},{"value":"Task Sheet","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Task Sheet","description":"","tags":[],"dependencyGroup":null},{"value":"Task Usage","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Task Usage","description":"","tags":[],"dependencyGroup":null},{"value":"Tracking Gantt","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tracking Gantt","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"Bar Rollup","description":"Specifies the view that Project displays at startup.\n      \nIf you enable this setting, you can set the default view that is displayed at startup.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["View","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\view","registrySubPath":"default view","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_PjDeleteNameOOUI","uniqueId":4282,"displayName":"Deletions in the Name column","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Specifies that the delete indicator should appear in the Indicators field if you delete text in the Task Name or Resource Names field.\n\nIf you enable this setting, the delete indicator will appear if the user deletes a Task Name or Resource Names.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Show indicators and Option butons for","Interface","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\interface","registrySubPath":"deletenameooui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjDurationUnits","uniqueId":4236,"displayName":"Duration is entered in","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjDurationUnits;L_pjdurationunits23","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the unit of time (minutes, hours, days, weeks, or months) used by default in the Duration field.\n\nIf you enable this setting, the unit you specify will be used if the user does not specify a unit of time when entering a duration.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjDurationUnits;L_pjdurationunits23","uniqueId":4235,"displayName":"Duration is entered in","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Minutes","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hours","description":"","tags":[],"dependencyGroup":null},{"value":7,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Days","description":"","tags":[],"dependencyGroup":null},{"value":9,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Weeks","description":"","tags":[],"dependencyGroup":null},{"value":11,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Months","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":3,"description":"Specifies the unit of time (minutes, hours, days, weeks, or months) used by default in the Duration field.\n\nIf you enable this setting, the unit you specify will be used if the user does not specify a unit of time when entering a duration.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\scheduling","registrySubPath":"default duration units","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjEditDirectlyCell","uniqueId":4189,"displayName":"Edit directly in cell","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Allows editing directly in the selected cell.\n      \nIf you enable this setting, users can directly edit a cell's value.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Edit options for Microsoft Project","Edit","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\edit","registrySubPath":"incelledit","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjEditstoTotalTask","uniqueId":4258,"displayName":"Edits to total task % complete will be spread to the status date","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Distributes the changes to total percent complete evenly across the schedule to the project status date (or to the current date if you haven't specified a project status date).\n\nIf you enable this setting, edits to total task percent complete are evenly distributed across the schedule up to the status date.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calculation options for 'Project1'","Calculation","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calculation","registrySubPath":"edits to total task %complete will be spread to the status date","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjEditToTotalSpread","uniqueId":4261,"displayName":"Edits to total actual cost will be spread to the status date","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Distributes the changes to total actual cost evenly across the schedule to the status date (or to the current date if you have not specified a project status date).\n\nIf you enable this setting, Project will distribute edits to actual cost evenly across a task up to the status date.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calculation options for 'Project1'","Calculation","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calculation","registrySubPath":"edits to total actual cost will be spread to the status date","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjEnterDateOOUI","uniqueId":4281,"displayName":"Edits to start and finish dates","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Specifies that the feedback triangle should appear in a corner of the Duration field or the Task Name field if you change a task's work, units, or duration.\n\nIf you enable this setting, a feedback triangle is displayed in the corner of the Duration or Task Name field if the user changes the task's work, units, or duration.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Show indicators and Option butons for","Interface","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\interface","registrySubPath":"enterdateooui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjEntryBar","uniqueId":4168,"displayName":"Entry Bar","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Displays the entry bar, in which you can enter or edit field information.\nIf you enable this setting, the entry bar is displayed.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Show","View","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\view","registrySubPath":"show entry bar","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjEVBaseline","uniqueId":4257,"displayName":"Baseline for Earned Value calculations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjEVBaseline;L_pjevbaseline27","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the baseline that is used to measure project performance using earned value analysis.\n\nIf you enable this setting, Project will calculate earned value using the baseline you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Earned Value options for Project1","Calculation options for 'Project1'","Calculation","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjEVBaseline;L_pjevbaseline27","uniqueId":4256,"displayName":"Baseline for Earned Value calculations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Baseline","description":"","tags":[],"dependencyGroup":null},{"value":12,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Baseline 1","description":"","tags":[],"dependencyGroup":null},{"value":13,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Baseline 2","description":"","tags":[],"dependencyGroup":null},{"value":14,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Baseline 3","description":"","tags":[],"dependencyGroup":null},{"value":15,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Baseline 4","description":"","tags":[],"dependencyGroup":null},{"value":16,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Baseline 5","description":"","tags":[],"dependencyGroup":null},{"value":17,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Baseline 6","description":"","tags":[],"dependencyGroup":null},{"value":18,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Baseline 7","description":"","tags":[],"dependencyGroup":null},{"value":19,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Baseline 8","description":"","tags":[],"dependencyGroup":null},{"value":20,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Baseline 9","description":"","tags":[],"dependencyGroup":null},{"value":21,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Baseline 10","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Specifies the baseline that is used to measure project performance using earned value analysis.\n\nIf you enable this setting, Project will calculate earned value using the baseline you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Earned Value options for Project1","Calculation options for 'Project1'","Calculation","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calculation","registrySubPath":"evbaseline","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjEVMethod","uniqueId":4255,"displayName":"Default task Earned Value method","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjEVMethod;L_pjevmethod26","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the method used for earned value analysis.\n\nIf you enable this setting, Project will calculate earned value using the method you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Earned Value options for Project1","Calculation options for 'Project1'","Calculation","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjEVMethod;L_pjevmethod26","uniqueId":4254,"displayName":"Default task Earned Value method","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"% Complete","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Physical % Complete","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Specifies the method used for earned value analysis.\n\nIf you enable this setting, Project will calculate earned value using the method you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Earned Value options for Project1","Calculation options for 'Project1'","Calculation","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calculation","registrySubPath":"evmethod","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjFileLocProjects","uniqueId":4270,"displayName":"Projects","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjFileLocProjects;L_pjfilelocprojects31","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the default location in the computer system for saving and opening projects.\n\nIf you enable this policy setting, the location first appears in the Open and Save As dialog box.\n\nIf you disable or do not configure this policy setting, the users default for this setting is followed.","supportedPlatforms":["Windows"],"tags":["File locations","Save","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjFileLocProjects;L_pjfilelocprojects31","uniqueId":4269,"displayName":"Projects","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"Specifies the default location in the computer system for saving and opening projects.\n\nIf you enable this policy setting, the location first appears in the Open and Save As dialog box.\n\nIf you disable or do not configure this policy setting, the users default for this setting is followed.","supportedPlatforms":["Windows"],"tags":["File locations","Save","Project Options","Microsoft Project 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\save","registrySubPath":"defaultprojectspath","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_PjFileLocUserTemplates","uniqueId":4272,"displayName":"User Templates","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjFileLocUserTemplates;L_pjfilelocusertemplates32","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the default location in the computer system for saving and opening workgroup templates.\n\nIf you enable this policy setting, the location first appears in the Open and Save As dialog box.\n\nIf you disable or do not configure this policy setting, the users default for this setting is followed.","supportedPlatforms":["Windows"],"tags":["File locations","Save","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjFileLocUserTemplates;L_pjfilelocusertemplates32","uniqueId":4271,"displayName":"User Templates","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specifies the default location in the computer system for saving and opening workgroup templates.\n\nIf you enable this policy setting, the location first appears in the Open and Save As dialog box.\n\nIf you disable or do not configure this policy setting, the users default for this setting is followed.","supportedPlatforms":["Windows"],"tags":["File locations","Save","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\save","registrySubPath":"defaultusertemplatespath","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_PjFileType","uniqueId":4268,"displayName":"Save Microsoft Project files as","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjFileType;L_pjfiletype30","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the default file format that should be applied when any Project file is saved.\n\nIf you enable this setting, project files will be saved with the format you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Save","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjFileType;L_pjfiletype30","uniqueId":4267,"displayName":"Save Microsoft Project files as","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"MSProject.MPP.12","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Project (*.mpp)","description":"","tags":[],"dependencyGroup":null},{"value":"MSProject.MPT.12","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Template (*.mpt)","description":"","tags":[],"dependencyGroup":null},{"value":"MSProject.MPP.9","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Project 2000-2003 (*.mpp)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"MSProject.MPP.12","description":"Specifies the default file format that should be applied when any Project file is saved.\n\nIf you enable this setting, project files will be saved with the format you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Save","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\save","registrySubPath":"defaultsaveformat","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_PjFiscalYear","uniqueId":4211,"displayName":"Fiscal year starts in","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjFiscalYear;L_pjfiscalyear17","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the month that begins the fiscal year.\n\nIf you enable this setting, the fiscal year will start on the month you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calendar","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjFiscalYear;L_pjfiscalyear17","uniqueId":4210,"displayName":"Fiscal year starts in","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"January","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"February","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"March","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"April","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"May","description":"","tags":[],"dependencyGroup":null},{"value":6,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"June","description":"","tags":[],"dependencyGroup":null},{"value":7,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"July","description":"","tags":[],"dependencyGroup":null},{"value":8,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"August","description":"","tags":[],"dependencyGroup":null},{"value":9,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"September","description":"","tags":[],"dependencyGroup":null},{"value":10,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"October","description":"","tags":[],"dependencyGroup":null},{"value":11,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"November","description":"","tags":[],"dependencyGroup":null},{"value":12,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"December","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Specifies the month that begins the fiscal year.\n\nIf you enable this setting, the fiscal year will start on the month you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calendar","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calendar","registrySubPath":"fiscal year starts in","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjFollowedlinkColour","uniqueId":4206,"displayName":"Followed hyperlink color","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjFollowedlinkColour;L_pjfollowedlinkcolour15","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the color of hyperlinks that have already been followed.\n\nIf you enable this setting, hyperlinks that have been followed are displayed in the color you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Hyperlink appearance in 'Project1'","Edit","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjFollowedlinkColour;L_pjfollowedlinkcolour15","uniqueId":4205,"displayName":"Followed hyperlink color","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":16,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatic","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Black","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Red","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yellow","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Lime","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Aqua","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Blue","description":"","tags":[],"dependencyGroup":null},{"value":6,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Fuchsia","description":"","tags":[],"dependencyGroup":null},{"value":7,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"White","description":"","tags":[],"dependencyGroup":null},{"value":8,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Maroon","description":"","tags":[],"dependencyGroup":null},{"value":9,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Green","description":"","tags":[],"dependencyGroup":null},{"value":10,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Olive","description":"","tags":[],"dependencyGroup":null},{"value":11,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Navy","description":"","tags":[],"dependencyGroup":null},{"value":12,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Purple","description":"","tags":[],"dependencyGroup":null},{"value":13,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Teal","description":"","tags":[],"dependencyGroup":null},{"value":14,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gray","description":"","tags":[],"dependencyGroup":null},{"value":15,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Silver","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":16,"description":"Specifies the color of hyperlinks that have already been followed.\n\nIf you enable this setting, hyperlinks that have been followed are displayed in the color you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Hyperlink appearance in 'Project1'","Edit","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\edit","registrySubPath":"webfollowedcolor","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjGBUIDisplayToggle","uniqueId":4283,"displayName":"Display Project Guide","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Displays the side pane containing the Project Guide.\n\nIf you enable this setting, the Project Guide will be displayed.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Project Guide settings","Interface","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\interface","registrySubPath":"gbuidisplaytoggle","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjHoursPerDay","uniqueId":4218,"displayName":"Hours per day","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjHoursPerDay;L_pjhoursperday18","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines the number of hours that you want Project to assign to a task when the user enters a duration of one day.\n\nIf you enable this setting, day-long tasks will be assigned the number of hours that you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calendar","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjHoursPerDay;L_pjhoursperday18","uniqueId":4217,"displayName":"Hours per day","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Defines the number of hours that you want Project to assign to a task when the user enters a duration of one day.\n\nIf you enable this setting, day-long tasks will be assigned the number of hours that you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calendar","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calendar","registrySubPath":"default hours/day","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_PjHoursPerWeek","uniqueId":4220,"displayName":"Hours per week","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjHoursPerWeek;L_pjhoursperweek19","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the number of hours that you want Project to assign to a task when the user enters a duration of one week.\n\nIf you enable this setting, week-long tasks will be assigned the number of hours that you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calendar","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjHoursPerWeek;L_pjhoursperweek19","uniqueId":4219,"displayName":"Hours per week","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specifies the number of hours that you want Project to assign to a task when the user enters a duration of one week.\n\nIf you enable this setting, week-long tasks will be assigned the number of hours that you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calendar","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calendar","registrySubPath":"default hours/week","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_PjHours","uniqueId":4193,"displayName":"Hours","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjHours;L_pjhours9","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the label for hours.\n      \nIf you enable this setting, hours are displayed with the specified label.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["View options for time units in 'Project1'","Edit","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjHours;L_pjhours9","uniqueId":4192,"displayName":"Hours","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"h","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"hr","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"hour","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the label for hours.\n      \nIf you enable this setting, hours are displayed with the specified label.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["View options for time units in 'Project1'","Edit","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\edit","registrySubPath":"hourlabeldisplay","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjHyperLinkColour","uniqueId":4204,"displayName":"Hyperlink color","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjHyperLinkColour;L_pjhyperlinkcolour14","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the color of hyperlinks that have not yet been followed.\n      \nIf you enable this setting, hyperlinks that have not been followed are displayed in the color you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Hyperlink appearance in 'Project1'","Edit","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjHyperLinkColour;L_pjhyperlinkcolour14","uniqueId":4203,"displayName":"Hyperlink color","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":16,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatic","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Black","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Red","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yellow","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Lime","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Aqua","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Blue","description":"","tags":[],"dependencyGroup":null},{"value":6,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Fuchsia","description":"","tags":[],"dependencyGroup":null},{"value":7,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"White","description":"","tags":[],"dependencyGroup":null},{"value":8,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Maroon","description":"","tags":[],"dependencyGroup":null},{"value":9,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Green","description":"","tags":[],"dependencyGroup":null},{"value":10,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Olive","description":"","tags":[],"dependencyGroup":null},{"value":11,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Navy","description":"","tags":[],"dependencyGroup":null},{"value":12,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Purple","description":"","tags":[],"dependencyGroup":null},{"value":13,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Teal","description":"","tags":[],"dependencyGroup":null},{"value":14,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gray","description":"","tags":[],"dependencyGroup":null},{"value":15,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Silver","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":16,"description":"Specifies the color of hyperlinks that have not yet been followed.\n      \nIf you enable this setting, hyperlinks that have not been followed are displayed in the color you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Hyperlink appearance in 'Project1'","Edit","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\edit","registrySubPath":"webnotfollowedcolor","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjInsertedProjects","uniqueId":4259,"displayName":"Inserted projects are calculated like summary tasks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Specifies that a single critical path is calculated throughout the master project, by treating inserted projects as summary tasks in the master project.\n\nIf you enable this setting, the critical path is calculated by treating inserted projects as summary tasks.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calculation options for 'Project1'","Calculation","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calculation","registrySubPath":"inserted projects are calculated like summary tasks","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjMinutes","uniqueId":4191,"displayName":"Minutes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjMinutes;L_pjminutes8","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the label for minutes.\n\nIf you enable this setting, minutes are displayed with the specified label.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["View options for time units in 'Project1'","Edit","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjMinutes;L_pjminutes8","uniqueId":4190,"displayName":"Minutes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"m","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"min","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"minute","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the label for minutes.\n\nIf you enable this setting, minutes are displayed with the specified label.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["View options for time units in 'Project1'","Edit","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\edit","registrySubPath":"minutelabeldisplay","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjMonths","uniqueId":4199,"displayName":"Months","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjMonths;L_pjmonths12","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the label for months.\n      \nIf you enable this setting, months are displayed with the specified label.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["View options for time units in 'Project1'","Edit","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjMonths;L_pjmonths12","uniqueId":4198,"displayName":"Months","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"mo","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"mon","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"month","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the label for months.\n      \nIf you enable this setting, months are displayed with the specified label.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["View options for time units in 'Project1'","Edit","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\edit","registrySubPath":"monthlabeldisplay","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjMoveAfterEnter","uniqueId":4187,"displayName":"Move selection after enter","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Automatically selects the field below the current field after the user presses the ENTER key.\n      \nIf you enable this setting, the field below the current field is selected after the user presses the ENTER key.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Edit options for Microsoft Project","Edit","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\edit","registrySubPath":"entermove","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjMoveCompleted","uniqueId":4252,"displayName":"Move end of completed parts after status date back to status date","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Moves the completed portion of a task back to finish at the status date.\n\nIf you enable this setting, the completed portion of the task moves back to finish at the status date.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calculation options for 'Project1'","Calculation","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calculation","registrySubPath":"movecompleted","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjMoveRemaining","uniqueId":4250,"displayName":"Move start of remaining parts before status date forward to status date","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Moves remaining portions of a task forward to start at the status date.\n\nIf you enable this setting, the remaining portion of the task moves forward to start at the status date.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calculation options for 'Project1'","Calculation","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calculation","registrySubPath":"moveremaining","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjNewTasksEffort","uniqueId":4241,"displayName":"New tasks are effort driven","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting specifies that new tasks are scheduled such that the work on the task remains constant as you add or remove assignments.\n\nIf you enable this policy setting, new tasks will be effort-driven.\n\nIf you disable or do not configure this policy setting, new tasks will not be effort-driven.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\scheduling","registrySubPath":"new tasks effort driven","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjNewTasksEstDurations","uniqueId":4246,"displayName":"New tasks have estimated durations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Specifies that all new tasks have estimated durations.\n\nIf you enable this setting, all new tasks will require estimated durations.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\scheduling","registrySubPath":"new tasks have estimated durations","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjNewTasks","uniqueId":4234,"displayName":"New tasks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjNewTasks;L_pjnewtasks22","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the default start date for new tasks as they are entered in the current project.  For projects scheduled from the start date, the options are \"Start on Project Start Date\" and \"Start on Current Date.\"  For projects scheduled from the finish date, the options are \"Finish on Project Finish Date\" and \"Start on Current Date.\"\n\nIf you enable this setting, new tasks will start on the date you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjNewTasks;L_pjnewtasks22","uniqueId":4233,"displayName":"New tasks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Start on Project Start Date","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Start on Current Date","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Specifies the default start date for new tasks as they are entered in the current project.  For projects scheduled from the start date, the options are \"Start on Project Start Date\" and \"Start on Current Date.\"  For projects scheduled from the finish date, the options are \"Finish on Project Finish Date\" and \"Start on Current Date.\"\n\nIf you enable this setting, new tasks will start on the date you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\scheduling","registrySubPath":"new tasks start on current date","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjOLElinks","uniqueId":4169,"displayName":"OLE Link Indicators","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Displays the indicator for OLE linked objects in the lower-right corner of the cell that contains the link.\nIf you enable this setting, the indicator is displayed for OLE linked objects.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Show","View","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\view","registrySubPath":"show ole link indicators","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjOpenLast","uniqueId":4173,"displayName":"Open last file on startup","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Upon starting Project, automatically opens the last used project file.\n    \nIf you enable this setting, the last file that the user had open automatically re-opens when they start Project.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["General options for Microsoft Project","General","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\general","registrySubPath":"start with last file","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjProjectScreentips","uniqueId":4170,"displayName":"Project Screentips","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Displays tips for Gantt bars and field headings, including dates for timescale units, and the full cell contents if a cell is too narrow to completely display the text in sheet and Network Diagram views.\n\nIf you enable this setting, tips are displayed for Gantt bars and field headings.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Show","View","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\view","registrySubPath":"show tooltips","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjPromptForInfo","uniqueId":4174,"displayName":"Prompt for project info for new projects","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Opens the Project Information dialog box whenever the user creates a new project.\n\nIf you enable this setting, the Project Information dialog box is displayed whenever you create a new project.\n\nIf you disable or do not configure this setting, the users default setting is followed.","supportedPlatforms":["Windows"],"tags":["General options for Microsoft Project","General","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\general","registrySubPath":"ask for summary info at new","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjRecentlyUsed;L_PjMRUT","uniqueId":4176,"displayName":"Number of entries: ","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":50},"dataType":"Integer"},"description":"This policy setting specifies the number of entries displayed in the Recent Projects list that appears when users click Open on the File tab in Backstage view.  \n\nIf you enable this policy setting, you can specify the number of entries to be between 0 and 50. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 25 items will be displayed in the Recent Projects list.\n\nNote: If you want to prevent items from being added to the Recent Projects list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["General options for Microsoft Project","General","Project Options","Microsoft Project 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\file mru","registrySubPath":"max display","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjRecentlyUsed","uniqueId":4177,"displayName":"Number of projects in the Recent Projects list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjRecentlyUsed;L_PjMRUT","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the number of entries displayed in the Recent Projects list that appears when users click Open on the File tab in Backstage view.  \n\nIf you enable this policy setting, you can specify the number of entries to be between 0 and 50. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 25 items will be displayed in the Recent Projects list.\n\nNote: If you want to prevent items from being added to the Recent Projects list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["General options for Microsoft Project","General","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjResourceAssignOOUI","uniqueId":4279,"displayName":"Resource Assigments","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Specifies that the feedback triangle should appear in a corner of a field if the user assigns additional resources to a task that already has resources assigned.\n\nIf you enable this setting, a feedback triangle is displayed in the corner of a field if users assign additional resources to a task that already has resources assigned.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Show indicators and Option butons for","Interface","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\interface","registrySubPath":"resourceassignooui","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjSaveEvery","uniqueId":4273,"displayName":"Auto Save every","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Specifies that you want Project to automatically save your projects periodically.\n\nIf you enable this setting, Project will save users projects at the specified interval.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Auto Save Options","Save","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\save","registrySubPath":"automaticsave","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjSaveInterval","uniqueId":4275,"displayName":"Save Interval","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjSaveInterval;L_pjsaveinterval33","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies how often Project should automatically save your projects.  This setting is only used by Project if Auto Save has been turned on.\n\nIf you enable this setting, Project will save users projects at the specified interval.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Auto Save Options","Save","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjSaveInterval;L_pjsaveinterval33","uniqueId":4274,"displayName":"Save Interval","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":120},"dataType":"Integer"},"description":"Specifies how often Project should automatically save your projects.  This setting is only used by Project if Auto Save has been turned on.\n\nIf you enable this setting, Project will save users projects at the specified interval.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Auto Save Options","Save","Project Options","Microsoft Project 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\save","registrySubPath":"automaticsaveinterval","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjScrollBar","uniqueId":4167,"displayName":"Scroll Bars","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Displays scrollbars for views.\n      \nIf you enable this setting, scrollbars are displayed in the views.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Show","View","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\view","registrySubPath":"show scroll bars","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjSecurityLevel","uniqueId":4417,"displayName":"Security Level","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjSecurityLevel;L_pjsecuritylevel36","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the level of security used when opening documents.\n\nIf you enable this policy setting, the security level you specified will be used when user open documents.\n\nIf you disable or do not configure this policy setting, the users default for this setting is followed.","supportedPlatforms":["Windows"],"tags":["Tools | Macro","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjSecurityLevel;L_pjsecuritylevel36","uniqueId":4416,"displayName":"Security Level","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Low (not recommended)","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Medium","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"High","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Very High","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Specifies the level of security used when opening documents.\n\nIf you enable this policy setting, the security level you specified will be used when user open documents.\n\nIf you disable or do not configure this policy setting, the users default for this setting is followed.","supportedPlatforms":["Windows"],"tags":["Tools | Macro","Security","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security","registrySubPath":"level","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjSetAutoFilter","uniqueId":4175,"displayName":"Set AutoFilter on for new projects","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting turns on AutoFilter automatically when the user creates a new project.\n\nIf you enable or do not configure this policy setting, AutoFilter is automatically turned on when users create a new project.\n\nIf you disable this policy setting, AutoFilter is not automatically turned on when users create a new project.","supportedPlatforms":["Windows"],"tags":["General options for Microsoft Project","General","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\general","registrySubPath":"set autofilter on for new projects","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjShowEstimatedDurations","uniqueId":4245,"displayName":"Show that tasks have estimated durations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Displays a question mark (?) after the duration unit of any task with an estimated duration.\n\nIf you enable this setting, tasks with estimated durations have a question mark after their duration unit.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\scheduling","registrySubPath":"show estimated durations","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjShowSchedMessage","uniqueId":4223,"displayName":"Show scheduling messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Displays messages about schedule inconsistencies, such as a successor task starting before the finish of the predecessor task.\n\nIf you enable this setting, users will be alerted about scheduling inconsistencies.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Schedule options for Microsoft Project","Schedule","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\scheduling","registrySubPath":"schedule messages","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjSplitinProgressTasks","uniqueId":4243,"displayName":"Split in-progress tasks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Allows rescheduling of remaining duration and work when a task slips or reports progress ahead of schedule.\n\nIf you enable this setting, the remaining duration and work will be rescheduled if a task slips or reports progress ahead of schedule.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\scheduling","registrySubPath":"auto split tasks","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjStartingYear","uniqueId":4212,"displayName":"Use starting year for FY numbering","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Labels the fiscal year using the calendar year in which the fiscal year begins.\n\nIf you enable this setting, the label for the fiscal year is the calendar year in which the fiscal year begins.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calendar","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calendar","registrySubPath":"use starting year for fy numbering","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjStatusBar","uniqueId":4165,"displayName":"Status Bar","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Displays the status bar, which shows information about the progress of certain operations in Project.\n      \nIf you enable this setting, the option to display the status bar is selected.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Show","View","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\view","registrySubPath":"show status bar","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjTasksHonorConstraints","uniqueId":4244,"displayName":"Tasks will always honor their constraint dates","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Specifies that Project schedules tasks according to their constraint dates.\n\nIf you enable this setting, task constraints will always be honored when tasks are scheduled.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\scheduling","registrySubPath":"honorconstraints","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjUnderlineLinks","uniqueId":4207,"displayName":"Underline hyperlinks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Shows hyperlinks with underlined text.\n\nIf you enable this setting, hyperlinks are underlined.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Hyperlink appearance in 'Project1'","Edit","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\edit","registrySubPath":"webunderlinehyperlinks","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjUpdatingTask","uniqueId":4249,"displayName":"Updating task status updates resource status","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Automatically updates resource status, such as actual and remaining work and cost, whenever you update task status, such as percent complete, actual duration, or remaining duration.\n\nIf you enable this setting, task status updates are automatically applied to resources.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calculation options for 'Project1'","Calculation","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calculation","registrySubPath":"auto track resources","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjUseDefaultStartPage;L_PjGBUIDefaultPageURL","uniqueId":4285,"displayName":"URL: ","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Choose whether the side pane displays the default Project Guide or a custom Project Guide your organization has developed.\n\nIf you enable this setting, the Project Guide you specified will be displayed when the Project Guide is opened.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Project Guide settings for 'Project1'","Interface","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\interface","registrySubPath":"gbuidefaultstartpageurl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_PjUseDefaultStartPage","uniqueId":4286,"displayName":"Project Guide Functionality and Layout page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjUseDefaultStartPage;L_pjusedefaultstartpage34","logicalOperator":"exists","values":null},{"dependee":"proj16;L_PjUseDefaultStartPage;L_PjGBUIDefaultPageURL","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Choose whether the side pane displays the default Project Guide or a custom Project Guide your organization has developed.\n\nIf you enable this setting, the Project Guide you specified will be displayed when the Project Guide is opened.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Project Guide settings for 'Project1'","Interface","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjUseDefaultStartPage;L_pjusedefaultstartpage34","uniqueId":4284,"displayName":"Project Guide Functionality and Layout page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use Microsoft Project's Default page","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use a custom page","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Choose whether the side pane displays the default Project Guide or a custom Project Guide your organization has developed.\n\nIf you enable this setting, the Project Guide you specified will be displayed when the Project Guide is opened.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Project Guide settings for 'Project1'","Interface","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\interface","registrySubPath":"usedefaultstartpage","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjUseDefaultXMLSchema;L_PjGBUIXMLSchemaPath","uniqueId":4288,"displayName":"XML file for custom content:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Specifies whether the side pane displays the Project Guide content that comes with Project or custom content that your organization has developed.\n\nIf you enable this setting, content for the Project Guide is loaded from the specified location.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Project Guide settings for 'Project1'","Interface","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\interface","registrySubPath":"gbuixmlschemapath","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_PjUseDefaultXMLSchema","uniqueId":4289,"displayName":"Project Guide Content","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjUseDefaultXMLSchema;L_pjusedefaultxmlschema35","logicalOperator":"exists","values":null},{"dependee":"proj16;L_PjUseDefaultXMLSchema;L_PjGBUIXMLSchemaPath","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies whether the side pane displays the Project Guide content that comes with Project or custom content that your organization has developed.\n\nIf you enable this setting, content for the Project Guide is loaded from the specified location.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Project Guide settings for 'Project1'","Interface","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjUseDefaultXMLSchema;L_pjusedefaultxmlschema35","uniqueId":4287,"displayName":"Project Guide Content","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use Microsoft Project's default content","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use custom content","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Specifies whether the side pane displays the Project Guide content that comes with Project or custom content that your organization has developed.\n\nIf you enable this setting, content for the Project Guide is loaded from the specified location.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Project Guide settings for 'Project1'","Interface","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\interface","registrySubPath":"usedefaultxmlschema","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjWeekStarts","uniqueId":4209,"displayName":"Week starts on","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjWeekStarts;L_pjweekstarts16","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the day of the week on which you want the scheduling week to begin.\n\nIf you enable this setting, weeks will start on the day you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calendar","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjWeekStarts;L_pjweekstarts16","uniqueId":4208,"displayName":"Week starts on","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":6,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Saturday","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sunday","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Monday","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tuesday","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Wednesday","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Thursday","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Friday","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":6,"description":"Specifies the day of the week on which you want the scheduling week to begin.\n\nIf you enable this setting, weeks will start on the day you specified.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Calendar","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\calendar","registrySubPath":"start week day","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjWeeks","uniqueId":4197,"displayName":"Weeks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjWeeks;L_PjWeeks11","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the label for weeks.\n\nIf you enable this setting, weeks are displayed with the specified label.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["View options for time units in 'Project1'","Edit","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjWeeks;L_PjWeeks11","uniqueId":4196,"displayName":"Weeks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"w","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"wk","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"week","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the label for weeks.\n\nIf you enable this setting, weeks are displayed with the specified label.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["View options for time units in 'Project1'","Edit","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\edit","registrySubPath":"weeklabeldisplay","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjWindowsinStatusBar","uniqueId":4166,"displayName":"Windows in Taskbar","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Specifies whether separate windows are opened and displayed as separate buttons on the Windows taskbar for every open project.\n      \nIf you enable this setting, a new window is displayed in the taskbar for each open project.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Show","View","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\view","registrySubPath":"show windows in taskbar","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjWorkUnits","uniqueId":4238,"displayName":"Work is entered in","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjWorkUnits;L_pjworkunits24","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the default unit of time (minutes, hours, days, weeks, or months) used in the Work field in the current project.\n\nIf you enable this setting, whenever Project displays work values, the unit you specified will be used.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjWorkUnits;L_pjworkunits24","uniqueId":4237,"displayName":"Work is entered in","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Minutes","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hours","description":"","tags":[],"dependencyGroup":null},{"value":7,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Days","description":"","tags":[],"dependencyGroup":null},{"value":9,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Weeks","description":"","tags":[],"dependencyGroup":null},{"value":11,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Months","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":3,"description":"Specifies the default unit of time (minutes, hours, days, weeks, or months) used in the Work field in the current project.\n\nIf you enable this setting, whenever Project displays work values, the unit you specified will be used.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\scheduling","registrySubPath":"default work units","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_PjYears","uniqueId":4201,"displayName":"Years","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_PjYears;L_pjyears13","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the label for years.\n      \nIf you enable this setting, years are displayed with the specified label.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["View options for time units in 'Project1'","Edit","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_PjYears;L_pjyears13","uniqueId":4200,"displayName":"Years","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"y","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"yr","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"year","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the label for years.\n      \nIf you enable this setting, years are displayed with the specified label.\n\nIf you disable or do not configure this setting, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["View options for time units in 'Project1'","Edit","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\edit","registrySubPath":"yearlabeldisplay","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_ProjectSummaryTask","uniqueId":4157,"displayName":"Project Summary Task","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Allows you to manage whether the project summary task is displayed. If you enable this setting, the project summary task is displayed. If this setting is disabled or not configured, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["View","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\view","registrySubPath":"show project summary","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_RequirethatApplicationExtensionsaresigned","uniqueId":4312,"displayName":"Require that application add-ins are signed by Trusted Publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting controls whether add-ins for this applications must be digitally signed by a trusted publisher.\n \nIf you enable this policy setting, this application checks the digital signature for each add-in before loading it. If an add-in does not have a digital signature, or if the signature did not come from a trusted publisher, this application disables the add-in and notifies the user. Certificates must be added to the Trusted Publishers list if you require that all add-ins be signed by a trusted publisher. For detail on about obtaining and distributing certificates, see http://go.microsoft.com/fwlink/?LinkId=294922. Office 2016 stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store.  Office 2016 still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store. Therefore, if you created a list of trusted publishers in a previous version of Office and you upgrade to Office 2016, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store. For more information about trusted publishers, see the Office Resource Kit.\n\nIf you disable or do not configure this policy setting, this application does not check the digital signature on application add-ins before opening them. If a dangerous add-in is loaded, it could harm users' computers or compromise data security.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security","registrySubPath":"requireaddinsig","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_SetCNGCipherAlgorithm","uniqueId":4293,"displayName":"Set CNG cipher algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_SetCNGCipherAlgorithm;L_SetCNGCipherAlgorithmID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the CNG cipher algorithm that is used.\n\nIf you enable this policy setting, then the cipher provided will be used if it is a supported algorithm.\n\nIf you disable or do not configure this policy setting, AES will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_SetCNGCipherAlgorithm;L_SetCNGCipherAlgorithmID","uniqueId":4292,"displayName":"CNG cipher algorithm:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to configure the CNG cipher algorithm that is used.\n\nIf you enable this policy setting, then the cipher provided will be used if it is a supported algorithm.\n\nIf you disable or do not configure this policy setting, AES will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Project Options","Microsoft Project 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\crypto","registrySubPath":"cipheralgorithm","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_SetCNGCipherKeyLength","uniqueId":4297,"displayName":"Set CNG cipher key length","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_SetCNGCipherKeyLength;L_SetCNGCipherKeyLengthSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the number of bits to use when creating the cipher key.  This number will be rounded down to a multiple of 8.\n\nIf you enable this policy setting, the key bits specified will be used.\n\nIf you disable or do not configure this policy setting, the default value will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_SetCNGCipherKeyLength;L_SetCNGCipherKeyLengthSpinID","uniqueId":4296,"displayName":"Cipher key length","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":1000000},"dataType":"Integer"},"defaultValue":"","description":"This policy setting allows you to configure the number of bits to use when creating the cipher key.  This number will be rounded down to a multiple of 8.\n\nIf you enable this policy setting, the key bits specified will be used.\n\nIf you disable or do not configure this policy setting, the default value will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Project Options","Microsoft Project 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\crypto","registrySubPath":"cipherkeybits","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_SetCNGPasswordSpinCount","uniqueId":4303,"displayName":"Set CNG password spin count","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_SetCNGPasswordSpinCount;L_SetCNGPasswordSpinCountSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the number of times to spin (rehash) the password verifier.\n\nIf you enable this policy setting, the number specified will be the number of times the password will be rehashed.\n\nIf you disable or do not configure this policy setting, the default (100000) will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_SetCNGPasswordSpinCount;L_SetCNGPasswordSpinCountSpinID","uniqueId":4302,"displayName":"Set CNG password spin count","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":10000000},"dataType":"Integer"},"defaultValue":"100000","description":"This policy setting allows you to specify the number of times to spin (rehash) the password verifier.\n\nIf you enable this policy setting, the number specified will be the number of times the password will be rehashed.\n\nIf you disable or do not configure this policy setting, the default (100000) will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Project Options","Microsoft Project 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\crypto","registrySubPath":"passwordspincount","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_SetDefaultStartDateForNewTasks","uniqueId":4226,"displayName":"Set default start date for new tasks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting specifies the default start date for new tasks as they are entered in the current project.  For projects scheduled from the start date, the options are \"Start on Project Start Date\" and \"Start on Current Date.\"  For projects scheduled from the finish date, the options are \"Finish on Project Finish Date\" and \"Start on Current Date.\"\n\nIf you enable or do not configure this policy setting, new tasks will start on the project start date.\n\nIf you disable this policy setting, new tasks will not start on the project start date.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\scheduling","registrySubPath":"new tasks start on current date","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_SetNewTasksToBeAutomaticallyScheduled","uniqueId":4227,"displayName":"Set new tasks to be automatically scheduled","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting will set new tasks to be automatically scheduled.\n\nIf you enable this policy setting, new tasks will be automatically scheduled.\n\nIf you disable or do not configure this policy setting, new tasks will be manually scheduled.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\scheduling","registrySubPath":"newtasksaremanuallyscheduled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_SetNumberOfPlacesInTheRecentPlacesList","uniqueId":4179,"displayName":"Number of folders in the Recent Folders list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_SetNumberOfPlacesInTheRecentPlacesList;L_SetNumberOfPlacesInTheRecentPlacesListSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the number of unpinned entries displayed in the Recent Folders list that appears when users click Open or Save As on the File tab in Backstage view.\n\nIf you enable this policy setting, you can specify the number of unpinned entries to be between 0 and 20. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 5 unpinned items are displayed in the Recent Folders list.\n\nNote: If you want to prevent items from being added to the Recent Folders list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["General options for Microsoft Project","General","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_SetNumberOfPlacesInTheRecentPlacesList;L_SetNumberOfPlacesInTheRecentPlacesListSpinID","uniqueId":4178,"displayName":"Number of folders: ","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":20},"dataType":"Integer"},"defaultValue":"5","description":"This policy setting specifies the number of unpinned entries displayed in the Recent Folders list that appears when users click Open or Save As on the File tab in Backstage view.\n\nIf you enable this policy setting, you can specify the number of unpinned entries to be between 0 and 20. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 5 unpinned items are displayed in the Recent Folders list.\n\nNote: If you want to prevent items from being added to the Recent Folders list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["General options for Microsoft Project","General","Project Options","Microsoft Project 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\place mru","registrySubPath":"max display","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_SetParametersForCNGContext","uniqueId":4299,"displayName":"Set parameters for CNG context","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_SetParametersForCNGContext;L_SetParametersForCNGContextID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the encryption parameters that should be used for the CNG context. \n\nIf you enable this policy setting, the parameters specified will be passed to the CNG context.\n\nIf you disable or do not configure this policy setting, the default CNG values will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_SetParametersForCNGContext;L_SetParametersForCNGContextID","uniqueId":4298,"displayName":"Parameters","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to specify the encryption parameters that should be used for the CNG context. \n\nIf you enable this policy setting, the parameters specified will be passed to the CNG context.\n\nIf you disable or do not configure this policy setting, the default CNG values will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Project Options","Microsoft Project 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\crypto","registrySubPath":"context","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_ShowTasksScheduleSuggestions","uniqueId":4232,"displayName":"Show tasks schedule suggestions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting will allow the display of green task suggestions to indicate potential optimization.\n\nIf you enable this policy setting, a green task suggestion will be displayed to indicate potential problems.\n\nIf you disable or do not configure this policy setting, a green task suggestion will not be displayed to indicate potential problems.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\scheduling","registrySubPath":"showtasksuggestions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_ShowTasksScheduleWarnings","uniqueId":4230,"displayName":"Show tasks schedule warnings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting will allow the display of red task warnings to indicate potential problems.\n\nIf you enable or do not configure this policy setting, a red task warning will be displayed to indicate potential problems.\n\nIf you disable this policy setting, a red task warning will not be displayed to indicate potential problems.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\scheduling","registrySubPath":"showtaskwarnings","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_SpecifyCNGHashAlgorithm","uniqueId":4301,"displayName":"Specify CNG hash algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_SpecifyCNGHashAlgorithm;L_SpecifyCNGHashAlgorithmDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the hash algorithm used.\n\nIf you enable this policy setting, the hashing algorithm selected will be used by CNG.\n\nIf you disable or do not configure this policy setting, the default CNG hash algorithm will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_SpecifyCNGHashAlgorithm;L_SpecifyCNGHashAlgorithmDropID","uniqueId":4300,"displayName":"Specify CNG hash algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"SHA1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA1","description":"","tags":[],"dependencyGroup":null},{"value":"SHA256","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA256","description":"","tags":[],"dependencyGroup":null},{"value":"SHA384","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA384","description":"","tags":[],"dependencyGroup":null},{"value":"SHA512","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA512","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"SHA256","description":"This policy setting allows you to specify the hash algorithm used.\n\nIf you enable this policy setting, the hashing algorithm selected will be used by CNG.\n\nIf you disable or do not configure this policy setting, the default CNG hash algorithm will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\crypto","registrySubPath":"hashalgorithm","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_SpecifyCNGRandomNumberGeneratorAlgorithm","uniqueId":4305,"displayName":"Specify CNG random number generator algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_SpecifyCNGRandomNumberGeneratorAlgorithm;L_SpecifyCNGRandomNumberGeneratorAlgorithmID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the CNG random number generator to use.\n\nIf you enable this policy setting, the random number generator specified will be used.\n\nIf you disable or do not configure this policy setting, the default random number generator will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_SpecifyCNGRandomNumberGeneratorAlgorithm;L_SpecifyCNGRandomNumberGeneratorAlgorithmID","uniqueId":4304,"displayName":"Random number generator:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to configure the CNG random number generator to use.\n\nIf you enable this policy setting, the random number generator specified will be used.\n\nIf you disable or do not configure this policy setting, the default random number generator will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Project Options","Microsoft Project 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\crypto","registrySubPath":"rngalgorithm","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_SpecifyCNGSaltLength","uniqueId":4307,"displayName":"Specify CNG salt length","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_SpecifyCNGSaltLength;L_SpecifyCNGSaltLengthSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specific the number of bytes of salt that should be used.\n\nIf you enable this policy setting, the bytes specified will be used.\n\nIf you disable or do not configure this policy setting, the default length or 16 will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_SpecifyCNGSaltLength;L_SpecifyCNGSaltLengthSpinID","uniqueId":4306,"displayName":"Number of bytes","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":5000},"dataType":"Integer"},"defaultValue":"16","description":"This policy setting allows you to specific the number of bytes of salt that should be used.\n\nIf you enable this policy setting, the bytes specified will be used.\n\nIf you disable or do not configure this policy setting, the default length or 16 will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Project Options","Microsoft Project 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\crypto","registrySubPath":"saltbytes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TasksCanBeMadeInactive","uniqueId":4229,"displayName":"Tasks can be made inactive","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting will allow tasks to be inactivated.\n\nIf you enable or do not configure this policy setting, users will be able to use the Inactive tasks feature, and tasks are allowed to be inactivated.\n\nIf you disable this policy setting, tasks cannot be inactivated.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\scheduling","registrySubPath":"canmakeinactivetasks","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc01;L_Allowsubfolders","uniqueId":4319,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location1","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc01;L_Datecolon","uniqueId":4317,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location1","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc01;L_Descriptioncolon","uniqueId":4318,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location1","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc01;L_Pathcolon","uniqueId":4316,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location1","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc01","uniqueId":4320,"displayName":"Trusted Location #1","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_TrustedLoc01;L_Pathcolon","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc01;L_Datecolon","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc01;L_Descriptioncolon","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc01;L_Allowsubfolders","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_TrustedLoc02;L_allowsubfolders15","uniqueId":4324,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location2","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc02;L_datecolon13","uniqueId":4322,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location2","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc02;L_descriptioncolon14","uniqueId":4323,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location2","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc02;L_pathcolon12","uniqueId":4321,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location2","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc02","uniqueId":4325,"displayName":"Trusted Location #2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_TrustedLoc02;L_pathcolon12","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc02;L_datecolon13","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc02;L_descriptioncolon14","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc02;L_allowsubfolders15","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_TrustedLoc03;L_allowsubfolders19","uniqueId":4329,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location3","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc03;L_datecolon17","uniqueId":4327,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location3","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc03;L_descriptioncolon18","uniqueId":4328,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location3","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc03;L_pathcolon16","uniqueId":4326,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location3","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc03","uniqueId":4330,"displayName":"Trusted Location #3","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_TrustedLoc03;L_pathcolon16","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc03;L_datecolon17","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc03;L_descriptioncolon18","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc03;L_allowsubfolders19","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_TrustedLoc04;L_allowsubfolders23","uniqueId":4334,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location4","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc04;L_datecolon21","uniqueId":4332,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location4","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc04;L_descriptioncolon22","uniqueId":4333,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location4","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc04;L_pathcolon20","uniqueId":4331,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location4","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc04","uniqueId":4335,"displayName":"Trusted Location #4","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_TrustedLoc04;L_pathcolon20","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc04;L_datecolon21","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc04;L_descriptioncolon22","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc04;L_allowsubfolders23","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_TrustedLoc05;L_allowsubfolders27","uniqueId":4339,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location5","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc05;L_datecolon25","uniqueId":4337,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location5","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc05;L_descriptioncolon26","uniqueId":4338,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location5","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc05;L_pathcolon24","uniqueId":4336,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location5","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc05","uniqueId":4340,"displayName":"Trusted Location #5","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_TrustedLoc05;L_pathcolon24","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc05;L_datecolon25","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc05;L_descriptioncolon26","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc05;L_allowsubfolders27","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_TrustedLoc06;L_allowsubfolders31","uniqueId":4344,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location6","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc06;L_datecolon29","uniqueId":4342,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location6","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc06;L_descriptioncolon30","uniqueId":4343,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location6","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc06;L_pathcolon28","uniqueId":4341,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location6","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc06","uniqueId":4345,"displayName":"Trusted Location #6","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_TrustedLoc06;L_pathcolon28","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc06;L_datecolon29","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc06;L_descriptioncolon30","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc06;L_allowsubfolders31","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_TrustedLoc07;L_allowsubfolders35","uniqueId":4349,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location7","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc07;L_datecolon33","uniqueId":4347,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location7","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc07;L_descriptioncolon34","uniqueId":4348,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location7","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc07;L_pathcolon32","uniqueId":4346,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location7","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc07","uniqueId":4350,"displayName":"Trusted Location #7","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_TrustedLoc07;L_pathcolon32","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc07;L_datecolon33","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc07;L_descriptioncolon34","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc07;L_allowsubfolders35","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_TrustedLoc08;L_allowsubfolders39","uniqueId":4354,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location8","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc08;L_datecolon37","uniqueId":4352,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location8","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc08;L_descriptioncolon38","uniqueId":4353,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location8","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc08;L_pathcolon36","uniqueId":4351,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location8","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc08","uniqueId":4355,"displayName":"Trusted Location #8","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_TrustedLoc08;L_pathcolon36","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc08;L_datecolon37","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc08;L_descriptioncolon38","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc08;L_allowsubfolders39","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_TrustedLoc09;L_allowsubfolders43","uniqueId":4359,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location9","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc09;L_datecolon41","uniqueId":4357,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location9","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc09;L_descriptioncolon42","uniqueId":4358,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location9","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc09;L_pathcolon40","uniqueId":4356,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location9","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc09","uniqueId":4360,"displayName":"Trusted Location #9","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_TrustedLoc09;L_pathcolon40","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc09;L_datecolon41","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc09;L_descriptioncolon42","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc09;L_allowsubfolders43","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_TrustedLoc10;L_allowsubfolders47","uniqueId":4364,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location10","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc10;L_datecolon45","uniqueId":4362,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location10","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc10;L_descriptioncolon46","uniqueId":4363,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location10","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc10;L_pathcolon44","uniqueId":4361,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location10","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc10","uniqueId":4365,"displayName":"Trusted Location #10","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_TrustedLoc10;L_pathcolon44","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc10;L_datecolon45","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc10;L_descriptioncolon46","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc10;L_allowsubfolders47","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_TrustedLoc11;L_allowsubfolders51","uniqueId":4369,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location11","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc11;L_datecolon49","uniqueId":4367,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location11","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc11;L_descriptioncolon50","uniqueId":4368,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location11","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc11;L_pathcolon48","uniqueId":4366,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location11","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc11","uniqueId":4370,"displayName":"Trusted Location #11","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_TrustedLoc11;L_pathcolon48","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc11;L_datecolon49","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc11;L_descriptioncolon50","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc11;L_allowsubfolders51","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_TrustedLoc12;L_allowsubfolders55","uniqueId":4374,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location12","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc12;L_datecolon53","uniqueId":4372,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location12","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc12;L_descriptioncolon54","uniqueId":4373,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location12","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc12;L_pathcolon52","uniqueId":4371,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location12","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc12","uniqueId":4375,"displayName":"Trusted Location #12","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_TrustedLoc12;L_pathcolon52","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc12;L_datecolon53","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc12;L_descriptioncolon54","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc12;L_allowsubfolders55","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_TrustedLoc13;L_allowsubfolders59","uniqueId":4379,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location13","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc13;L_datecolon57","uniqueId":4377,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location13","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc13;L_descriptioncolon58","uniqueId":4378,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location13","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc13;L_pathcolon56","uniqueId":4376,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location13","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc13","uniqueId":4380,"displayName":"Trusted Location #13","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_TrustedLoc13;L_pathcolon56","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc13;L_datecolon57","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc13;L_descriptioncolon58","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc13;L_allowsubfolders59","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_TrustedLoc14;L_allowsubfolders63","uniqueId":4384,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location14","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc14;L_datecolon61","uniqueId":4382,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location14","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc14;L_descriptioncolon62","uniqueId":4383,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location14","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc14;L_pathcolon60","uniqueId":4381,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location14","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc14","uniqueId":4385,"displayName":"Trusted Location #14","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_TrustedLoc14;L_pathcolon60","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc14;L_datecolon61","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc14;L_descriptioncolon62","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc14;L_allowsubfolders63","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_TrustedLoc15;L_allowsubfolders67","uniqueId":4389,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location15","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc15;L_datecolon65","uniqueId":4387,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location15","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc15;L_descriptioncolon66","uniqueId":4388,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location15","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc15;L_pathcolon64","uniqueId":4386,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location15","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc15","uniqueId":4390,"displayName":"Trusted Location #15","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_TrustedLoc15;L_pathcolon64","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc15;L_datecolon65","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc15;L_descriptioncolon66","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc15;L_allowsubfolders67","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_TrustedLoc16;L_allowsubfolders71","uniqueId":4394,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location16","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc16;L_datecolon69","uniqueId":4392,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location16","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc16;L_descriptioncolon70","uniqueId":4393,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location16","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc16;L_pathcolon68","uniqueId":4391,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location16","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc16","uniqueId":4395,"displayName":"Trusted Location #16","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_TrustedLoc16;L_pathcolon68","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc16;L_datecolon69","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc16;L_descriptioncolon70","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc16;L_allowsubfolders71","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_TrustedLoc17;L_allowsubfolders75","uniqueId":4399,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location17","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc17;L_datecolon73","uniqueId":4397,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location17","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc17;L_descriptioncolon74","uniqueId":4398,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location17","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc17;L_pathcolon72","uniqueId":4396,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location17","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc17","uniqueId":4400,"displayName":"Trusted Location #17","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_TrustedLoc17;L_pathcolon72","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc17;L_datecolon73","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc17;L_descriptioncolon74","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc17;L_allowsubfolders75","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_TrustedLoc18;L_allowsubfolders79","uniqueId":4404,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location18","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc18;L_datecolon77","uniqueId":4402,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location18","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc18;L_descriptioncolon78","uniqueId":4403,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location18","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc18;L_pathcolon76","uniqueId":4401,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location18","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc18","uniqueId":4405,"displayName":"Trusted Location #18","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_TrustedLoc18;L_pathcolon76","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc18;L_datecolon77","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc18;L_descriptioncolon78","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc18;L_allowsubfolders79","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_TrustedLoc19;L_allowsubfolders83","uniqueId":4409,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location19","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc19;L_datecolon81","uniqueId":4407,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location19","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc19;L_descriptioncolon82","uniqueId":4408,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location19","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc19;L_pathcolon80","uniqueId":4406,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location19","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc19","uniqueId":4410,"displayName":"Trusted Location #19","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_TrustedLoc19;L_pathcolon80","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc19;L_datecolon81","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc19;L_descriptioncolon82","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc19;L_allowsubfolders83","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_TrustedLoc20;L_allowsubfolders87","uniqueId":4414,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location20","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc20;L_datecolon85","uniqueId":4412,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location20","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc20;L_descriptioncolon86","uniqueId":4413,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location20","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc20;L_pathcolon84","uniqueId":4411,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security\\trusted locations\\location20","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"proj16;L_TrustedLoc20","uniqueId":4415,"displayName":"Trusted Location #20","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_TrustedLoc20;L_pathcolon84","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc20;L_datecolon85","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc20;L_descriptioncolon86","logicalOperator":"exists","values":null},{"dependee":"proj16;L_TrustedLoc20;L_allowsubfolders87","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_UndoLevels","uniqueId":4172,"displayName":"Undo Levels","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_UndoLevels;L_undolevels5","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Limits the number of actions (1-99)  that a user can undo. If you enable this setting, you can set a limit on  the number of actions (1-99) a user is can undo.  If you disable this setting or do not configure it, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["General","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"proj16;L_UndoLevels;L_undolevels5","uniqueId":4171,"displayName":"Undo Levels","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":1,"maximum":99},"dataType":"Integer"},"description":"Limits the number of actions (1-99)  that a user can undo. If you enable this setting, you can set a limit on  the number of actions (1-99) a user is can undo.  If you disable this setting or do not configure it, the user's default setting is used.","supportedPlatforms":["Windows"],"tags":["General","Project Options","Microsoft Project 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\general","registrySubPath":"undolevels","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_UpdateManuallyScheduledTasksWhenEditingLinks","uniqueId":4228,"displayName":"Update manually scheduled tasks when editing links","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting will allow the update of manually scheduled task dates when predecessor links are created or updated.\n\nIf you enable or do not configure this policy setting, manually scheduled task dates will be updated when predecessor links are created or updated.\n\nIf you disable this policy setting, manually scheduled task dates will not be updated when predecessor links are created or updated.","supportedPlatforms":["Windows"],"tags":["Scheduling options for 'Project1'","Schedule","Project Options","Microsoft Project 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\options\\scheduling","registrySubPath":"updatemanuallyscheduledtaskswheneditinglinks","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_VBAWarningsPolicy;L_Empty","uniqueId":4309,"displayName":"VBA Macro Notification Settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable all with notification","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable all except digitally signed macros","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable all without notification","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable all macros (not recommended)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":3,"recommendation":"security"}],"defaultValue":2,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n \nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\ms project\\security","registrySubPath":"vbawarnings","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"proj16;L_VBAWarningsPolicy","uniqueId":4310,"displayName":"VBA Macro Notification Settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"proj16;L_VBAWarningsPolicy;L_Empty","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n \nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Project Options","Microsoft Project 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"pub16;L_AdddoublequotesinHebrewalphabetnumbering","uniqueId":4487,"displayName":"Add double quotes in Hebrew alphabet numbering","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Checked: Adds double quotation marks ('') to Hebrew numbering. | Unchecked: Does not add double quotation marks ('') to Hebrew numbering.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"dubquohebalpnum","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_Allowbackgroundsaves","uniqueId":4454,"displayName":"Allow background saves","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Save","Publisher Options","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"backgroundsave","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_AllowTextToBeDraggedAndDropped","uniqueId":4443,"displayName":"Allow text to be dragged and dropped","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"textdragndrop","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_AutomaticallyHyphenateInNewTextBoxes","uniqueId":4447,"displayName":"Automatically hyphenate in new text boxes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Checks/Unchecks the option ''Automatically hyphenate in new text boxes''.","supportedPlatforms":["Windows"],"tags":["Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"defautohyph","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_AutomaticallysubstitutefontformissingEAchars","uniqueId":4439,"displayName":"Automatically substitute font for missing East Asian characters","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"usefontlinking","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_AutomaticallySwitchKeyboard","uniqueId":4442,"displayName":"Automatically switch keyboard to match the language of surrounding text","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"autokeybd","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_BlockAllUnmanagedAddins","uniqueId":4488,"displayName":"Block all unmanaged add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting blocks all add-ins that are not managed by the \"List of managed add-ins\" policy setting.\n\nIf you enable this policy setting, and the \"List of managed add-ins\" policy setting is also enabled, all add-ins are blocked except those that are configured as 1 (always enabled) or 2 (configurable by the user) in the \"List of managed add-ins\" policy setting.\n\nIf you disable or do not configure this policy setting, users can enable or disable any add-ins that are not managed by the \"List of managed add-ins\" policy setting.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\resiliency","registrySubPath":"restricttolist","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"pub16;L_BlockMacroExecutionFromInternet","uniqueId":4466,"displayName":"Block macros from running in Office files from the internet","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"\n        This policy setting allows you to block macros from running in Office files that come from the internet.\n\n        If you enable this policy setting, macros are blocked from running, even if \"Enable all macros\" is selected in the Macro Settings section of the Trust Center. Users will receive a notification that macros are blocked from running.\n\n        The exceptions when macros will be allowed to run are:\n        - The Office file is saved to a Trusted Location.\n        - The Office file was previously trusted by the user.\n        - Macros are digitally signed and the matching Trusted Publisher certificate is installed on the device.\n\n        If you disable this policy setting, the settings configured in the Macro Settings section of the Trust Center determine whether macros run in Office files that come from the internet.\n\n        If you don’t configure this policy setting, macros will be blocked from running. Users will receive a notification telling them of the security risks of macros from the internet along with a link to learn more.\n\n        For more information, see https://go.microsoft.com/fwlink/p/?linkid=2185771.\n      ","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\security","registrySubPath":"blockcontentexecutionfrominternet","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"pub16;L_Checkspellingasyoutype","uniqueId":4468,"displayName":"Check spelling as you type","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"pub16;L_Checkspellingasyoutype;L_CheckspellingasyoutypeDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure options for spelling errors.\n\nIf you enable this policy setting, you may choose one of these options:\n-  Check spelling as you type: This option is checked.\n-  Hide spelling errors: This option is checked, but \"Check spelling as you type\" is unchecked.\n- Both: \"Check spelling as you type\" and \"Hide spelling errors\" are both checked.\n\nIf you disable or do not configure this policy setting, the \"Check spelling as you type\" option is checked.","supportedPlatforms":["Windows"],"tags":["Proofing","Publisher Options","Microsoft Publisher 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"pub16;L_Checkspellingasyoutype;L_CheckspellingasyoutypeDropID","uniqueId":4467,"displayName":"Check spelling as you type","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Check spelling as you type","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hide spelling errors","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Both","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This policy setting allows you to configure options for spelling errors.\n\nIf you enable this policy setting, you may choose one of these options:\n-  Check spelling as you type: This option is checked.\n-  Hide spelling errors: This option is checked, but \"Check spelling as you type\" is unchecked.\n- Both: \"Check spelling as you type\" and \"Hide spelling errors\" are both checked.\n\nIf you disable or do not configure this policy setting, the \"Check spelling as you type\" option is checked.","supportedPlatforms":["Windows"],"tags":["Proofing","Publisher Options","Microsoft Publisher 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\shared tools\\proofing tools\\1.0\\office","registrySubPath":"publisherspellingoptions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"pub16;L_DefaultBuiltInTab","uniqueId":4495,"displayName":"Default tab to show in Publisher on the Office Start screen and in File | New","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"pub16;L_DefaultBuiltInTab;L_DefaultBuiltInTab","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls what displays as the default tab in Publisher on the Office Start screen and in File | New. \n\nIf you enable this policy setting, you can choose one of two options to become the default tab on the Office Start screen and in File | New:\n\n* Built-in – Users will the see built-in templates tab as the default tab in Publisher on the Office Start screen and in File | New.\n\n* Custom – Users will the see custom templates tab as the default tab in Publisher on the Office Start screen and in File | New when templates exist (this can include Custom XML programmed templates, templates in the Workgroup templates path, templates in the Personal templates path, or SharePoint templates).\n\nIf you disable or do not configure this policy setting, users will see the Featured templates tab as the default tab in Publisher on the Office Start screen and in File | New","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Publisher 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"pub16;L_DefaultBuiltInTab;L_DefaultBuiltInTab","uniqueId":4494,"displayName":"Default tab to show in Publisher on the Office Start screen and in File | New","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Featured","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Built-in","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Custom","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls what displays as the default tab in Publisher on the Office Start screen and in File | New. \n\nIf you enable this policy setting, you can choose one of two options to become the default tab on the Office Start screen and in File | New:\n\n* Built-in – Users will the see built-in templates tab as the default tab in Publisher on the Office Start screen and in File | New.\n\n* Custom – Users will the see custom templates tab as the default tab in Publisher on the Office Start screen and in File | New when templates exist (this can include Custom XML programmed templates, templates in the Workgroup templates path, templates in the Personal templates path, or SharePoint templates).\n\nIf you disable or do not configure this policy setting, users will see the Featured templates tab as the default tab in Publisher on the Office Start screen and in File | New","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Publisher 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"officestartdefaulttab","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"pub16;L_DefaultPublisherdirection","uniqueId":4484,"displayName":"Default Publisher direction","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"pub16;L_DefaultPublisherdirection;L_defaultpublisherdirection3","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the default layout orientation.","supportedPlatforms":["Windows"],"tags":["Complex scripts","Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"pub16;L_DefaultPublisherdirection;L_defaultpublisherdirection3","uniqueId":4483,"displayName":"Default Publisher direction","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Left to right","description":"","tags":[],"dependencyGroup":null},{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Right to left","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"Specifies the default layout orientation.","supportedPlatforms":["Windows"],"tags":["Complex scripts","Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"defaultrtl","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_Disableallapplicationextensions","uniqueId":4460,"displayName":"Block application add-ins loading","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting disables all add-ins for the specified Office 2016 applications.\n      \nIf you enable this policy setting, all add-ins for the specified Office 2016 applications are disabled.\n\nIf you disable or do not configure this policy setting, all add-ins for the specified Office 2016 applications are allowed to run without notifying the users, except if application add-ins are required to be signed by Trusted Publishers.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\security","registrySubPath":"disablealladdins","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"pub16;L_disablecommandbarbuttonsandmenuitems2","uniqueId":4481,"displayName":"Disable commands","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"pub16;L_disablecommandbarbuttonsandmenuitems2;L_EnteracommandbarIDtodisable","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable any command bar button and menu item with a command bar ID, including command bar buttons and menu items that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item. \n\nIf you disable or do not configure this policy setting, all default command bar buttons or menu items are available to users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Publisher 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"pub16;L_disablecommandbarbuttonsandmenuitems2;L_EnteracommandbarIDtodisable","uniqueId":4480,"displayName":"Enter a command bar ID to disable","settingType":{"possibleValues":{"possibleValuesType":"List","ValueType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to disable any command bar button and menu item with a command bar ID, including command bar buttons and menu items that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item. \n\nIf you disable or do not configure this policy setting, all default command bar buttons or menu items are available to users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Publisher 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\disabledcmdbaritemslist","registryPath":"TCID","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_Disablecommandbarbuttonsandmenuitems","uniqueId":4479,"displayName":"Disable predefined commands","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"pub16;L_Disablecommandbarbuttonsandmenuitems;L_FilePublishtoWeb","logicalOperator":"exists","values":null},{"dependee":"pub16;L_Disablecommandbarbuttonsandmenuitems;L_FileWebPagePreview","logicalOperator":"exists","values":null},{"dependee":"pub16;L_Disablecommandbarbuttonsandmenuitems;L_FileSendEmailSendthisPage","logicalOperator":"exists","values":null},{"dependee":"pub16;L_Disablecommandbarbuttonsandmenuitems;L_FileSendEmailEmailPreview","logicalOperator":"exists","values":null},{"dependee":"pub16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacro","logicalOperator":"exists","values":null},{"dependee":"pub16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroMacros","logicalOperator":"exists","values":null},{"dependee":"pub16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroSecurity","logicalOperator":"exists","values":null},{"dependee":"pub16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroVisualBasicEditor","logicalOperator":"exists","values":null},{"dependee":"pub16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsAddIns","logicalOperator":"exists","values":null},{"dependee":"pub16;L_Disablecommandbarbuttonsandmenuitems;L_PubOptions1","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable specific command bar buttons and menu items for Publisher.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for Publisher.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Publisher 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"pub16;L_Disablecommandbarbuttonsandmenuitems;L_FilePublishtoWeb","uniqueId":4469,"displayName":"File tab | Export | Publish HTML","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"9339","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items for Publisher.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for Publisher.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\disabledcmdbaritemscheckboxes","registrySubPath":"filepublishtoweb","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_Disablecommandbarbuttonsandmenuitems;L_FileSendEmailEmailPreview","uniqueId":4472,"displayName":"File tab | Share | E-mail Preview","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"9418","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items for Publisher.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for Publisher.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\disabledcmdbaritemscheckboxes","registrySubPath":"filesendemailemailpreview","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_Disablecommandbarbuttonsandmenuitems;L_FileSendEmailSendthisPage","uniqueId":4471,"displayName":"File tab | Share | Email","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"3738","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items for Publisher.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for Publisher.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\disabledcmdbaritemscheckboxes","registrySubPath":"filesendemailsendthispage","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_Disablecommandbarbuttonsandmenuitems;L_FileWebPagePreview","uniqueId":4470,"displayName":"Web tab | View | Web Page Preview","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"3655","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items for Publisher.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for Publisher.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\disabledcmdbaritemscheckboxes","registrySubPath":"filewebpagepreview","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_Disablecommandbarbuttonsandmenuitems;L_PubOptions1","uniqueId":4478,"displayName":"File tab | Options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"11323","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items for Publisher.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for Publisher.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsoptions","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsAddIns","uniqueId":4477,"displayName":"Developer tab | Add-Ins | COM Add-Ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"943","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items for Publisher.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for Publisher.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsaddins","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacro","uniqueId":4473,"displayName":"Developer tab","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"12557","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items for Publisher.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for Publisher.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacro","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroMacros","uniqueId":4474,"displayName":"Developer tab | Code | Macros","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"186","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items for Publisher.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for Publisher.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacromacros","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroSecurity","uniqueId":4475,"displayName":"Developer tab | Code | Macro Security","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"3627","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items for Publisher.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for Publisher.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacrosecurity","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroVisualBasicEditor","uniqueId":4476,"displayName":"Developer tab | Code | Visual Basic","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1695","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific command bar buttons and menu items for Publisher.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for Publisher.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacrovisualbasiceditor","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_DisableOfficeStartPublisher","uniqueId":4491,"displayName":"Disable the Office Start screen for Publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the Office Start screen appears on boot for Publisher.\n\nIf you enable this policy setting, users will not see the Office Start screen when they boot Publisher.\n\nIf you disable or do not configure this policy setting, users will see the Office Start screen when they boot Publisher.\n\nNote: This policy setting is overridden by the policy setting \"Microsoft Office 2016 > Miscellaneous > Disable the Office Start screen for all Office applications\" if that policy setting is set.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"disableboottoofficestart","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"pub16;L_DisablePublisher","uniqueId":4496,"displayName":"Disable Publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Publisher will be blocked from starting. ","supportedPlatforms":["Windows"],"tags":["Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher","registrySubPath":"disablelaunch","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"pub16;L_DisableTrustBarNotificationforunsigned","uniqueId":4459,"displayName":"Disable Trust Bar Notification for unsigned application add-ins and block them","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable such add-ins without notification. This policy setting only applies if you enable the \"Require that application add-ins are signed by Trusted Publisher\" policy setting, which prevents users from changing this policy setting.\n\nIf you enable this policy setting, applications automatically disable unsigned add-ins without informing users.\n \nIf you disable this policy setting, if this application is configured to require that all add-ins be signed by a trusted publisher, any unsigned add-ins the application loads will be disabled and the application will display the Trust Bar at the top of the active window. The Trust Bar contains a message that informs users about the unsigned add-in.\n\nIf you do not configure this policy setting, the disable behavior applies, and in addition, users can configure this requirement themselves in the \"Add-ins\" category of the Trust Center for the application.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\security","registrySubPath":"notbpromptunsignedaddin","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"pub16;L_DisplayDeveloperTab","uniqueId":4431,"displayName":"Display Developer tab in the Ribbon","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the Developer tab will be displayed in the Ribbon.\n\nIf you enable this policy setting, the Developer tab will be displayed in the Ribbon.\n\nIf you disable this policy setting, the Developer tab will not be displayed in the Ribbon.\n\nIf you do not configure this policy setting, the Developer tab will not be displayed in the Ribbon, but its visibility can be changed via a setting in the application Options dialog box.","supportedPlatforms":["Windows"],"tags":["Customize Ribbon","Publisher Options","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"developertools","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"pub16;L_Enableincrementalpublishtoweb","uniqueId":4449,"displayName":"Enable incremental publish to Web","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\internet","registrySubPath":"incrementalupload","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_ListOfManagedAddins","uniqueId":4490,"displayName":"List of managed add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"pub16;L_ListOfManagedAddins;L_ListOfManagedAddins2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify which add-ins are always enabled, always disabled (blocked), or configurable by the user. To block add-ins that are not managed by this policy setting, you must also configure the \"Block all unmanaged add-ins\" policy setting.\n\nTo enable this policy setting, provide the following information for each add-in:\n\nIn \"Value name,\" specify the programmatic identifier (ProgID) for COM add-ins.\n\nTo obtain the ProgID for an add-in, use Registry Editor on the client computer where the add-in is installed to locate key names under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Office\\Publisher\\Addins or HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Office\\Publisher\\Addins.\n\nYou can also obtain the ProgID of an add-in by using Office Telemetry Dashboard.\n\nIn \"Value,\" specify the value as follows:\n\nTo specify that an add-in is always disabled (blocked), type 0.\n\nTo specify that an add-in is always enabled, type 1.\n\nTo specify that an add-in is configurable by the user and not blocked by the \"Block all unmanaged add-ins\" policy setting when enabled, type 2.\n\nIf you disable or do not enable this policy setting, the list of managed add-ins is deleted. If the \"Block all unmanaged add-ins\" policy setting is enabled, then all add-ins are blocked.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Publisher 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\resiliency\\addinlist","registrySubPath":"policyon","enforcedValues":{"enabled":1}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\resiliency\\addinlist","registrySubPath":"policyon","enforcedValues":{"enabled":1}}]}}},{"id":"pub16;L_ListOfManagedAddins;L_ListOfManagedAddins2","uniqueId":4489,"displayName":"List of managed add-ins","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to specify which add-ins are always enabled, always disabled (blocked), or configurable by the user. To block add-ins that are not managed by this policy setting, you must also configure the \"Block all unmanaged add-ins\" policy setting.\n\nTo enable this policy setting, provide the following information for each add-in:\n\nIn \"Value name,\" specify the programmatic identifier (ProgID) for COM add-ins.\n\nTo obtain the ProgID for an add-in, use Registry Editor on the client computer where the add-in is installed to locate key names under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Office\\Publisher\\Addins or HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Office\\Publisher\\Addins.\n\nYou can also obtain the ProgID of an add-in by using Office Telemetry Dashboard.\n\nIn \"Value,\" specify the value as follows:\n\nTo specify that an add-in is always disabled (blocked), type 0.\n\nTo specify that an add-in is always enabled, type 1.\n\nTo specify that an add-in is configurable by the user and not blocked by the \"Block all unmanaged add-ins\" policy setting when enabled, type 2.\n\nIf you disable or do not enable this policy setting, the list of managed add-ins is deleted. If the \"Block all unmanaged add-ins\" policy setting is enabled, then all add-ins are blocked.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Publisher 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\resiliency\\addinlist","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_PersonalTemplatesPath","uniqueId":4493,"displayName":"Personal templates path for Publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"pub16;L_PersonalTemplatesPath;L_PersonalTemplatesPath","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the location of a user's personal templates. \n\nIf you enable this policy setting, users will see any templates they have saved in the specified location in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will change to be the specified location. \n\nIf you disable or do not configure this policy setting, users will not see templates they have saved in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will be their document save location.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Publisher 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"pub16;L_PersonalTemplatesPath;L_PersonalTemplatesPath","uniqueId":4492,"displayName":"Personal templates path for Publisher","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting specifies the location of a user's personal templates. \n\nIf you enable this policy setting, users will see any templates they have saved in the specified location in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will change to be the specified location. \n\nIf you disable or do not configure this policy setting, users will not see templates they have saved in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will be their document save location.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Publisher 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"personaltemplates","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"pub16;L_Preventfatallycorruptfilesfromopening","uniqueId":4457,"displayName":"Prompt to allow fatally corrupt files to open instead of blocking them","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"When disabled, fatally corrupt files are prevented from opening. When enabled, the user is warned but may choose to open the file.By default, fatally corrupt files are prevented from opening.","supportedPlatforms":["Windows"],"tags":["Security","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher","registrySubPath":"promptforbadfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"pub16;L_Promptusertosetupprinter","uniqueId":4482,"displayName":"Prompt user to setup printer","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"When set, Publisher will show a prompt to the user to start the Printer Setup Wizard when a new printer is found.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"showprintersetup","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_Promptuserwhenreapplyingastyle","uniqueId":4451,"displayName":"Prompt user when reapplying a style","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"prompttoupdatestyle","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_PublisherAutomationSecurityLevel;L_Empty","uniqueId":4455,"displayName":"Publisher Automation Security Level","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Low (enabled)","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"By UI (prompted)","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"High (disabled)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":2,"description":"This policy setting controls whether macros opened programmatically by another application can run in Publisher.\n\nIf you enable this policy setting, you may choose an option for controlling macro behavior in Publisher when the application is opened programmatically:\n\n- Low (enabled): Macros can run in the programmatically opened application.\n- By UI (prompted): Macro functionality is determined by the setting in the \"Macro Settings\" section of the Trust Center.\n- High (disabled):  All macros are disabled in the programmatically opened application.\n\nIf you disable or do not configure this policy setting, Publisher will use the default Macro setting in Trust Center.","supportedPlatforms":["Windows"],"tags":["Security","Microsoft Publisher 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\common\\security","registrySubPath":"automationsecuritypublisher","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"pub16;L_PublisherAutomationSecurityLevel","uniqueId":4456,"displayName":"Publisher Automation Security Level","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"pub16;L_PublisherAutomationSecurityLevel;L_Empty","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls whether macros opened programmatically by another application can run in Publisher.\n\nIf you enable this policy setting, you may choose an option for controlling macro behavior in Publisher when the application is opened programmatically:\n\n- Low (enabled): Macros can run in the programmatically opened application.\n- By UI (prompted): Macro functionality is determined by the setting in the \"Macro Settings\" section of the Trust Center.\n- High (disabled):  All macros are disabled in the programmatically opened application.\n\nIf you disable or do not configure this policy setting, Publisher will use the default Macro setting in Trust Center.","supportedPlatforms":["Windows"],"tags":["Security","Microsoft Publisher 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"pub16;L_RequirethatApplicationExtensionsaresigned","uniqueId":4458,"displayName":"Require that application add-ins are signed by Trusted Publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting controls whether add-ins for this applications must be digitally signed by a trusted publisher.\n \nIf you enable this policy setting, this application checks the digital signature for each add-in before loading it. If an add-in does not have a digital signature, or if the signature did not come from a trusted publisher, this application disables the add-in and notifies the user. Certificates must be added to the Trusted Publishers list if you require that all add-ins be signed by a trusted publisher. For detail on about obtaining and distributing certificates, see http://go.microsoft.com/fwlink/?LinkId=294922. Office 2016 stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store.  Office 2016 still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store. Therefore, if you created a list of trusted publishers in a previous version of Office and you upgrade to Office 2016, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store. For more information about trusted publishers, see the Office Resource Kit.\n\nIf you disable or do not configure this policy setting, this application does not check the digital signature on application add-ins before opening them. If a dangerous add-in is loaded, it could harm users' computers or compromise data security.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\security","registrySubPath":"requireaddinsig","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"pub16;L_SaveAutoRecoverinfoevery","uniqueId":4453,"displayName":"Save AutoRecover info every (minutes)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"pub16;L_SaveAutoRecoverinfoevery;L_SaveAutoRecoverinfoeveryID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the Save Autorecover interval in minutes.\n\nIf you enable this policy setting, you may specify the Save Autorecover interval in minutes (valid range: 1-120).\n\nIf you disable or do not configure this policy setting, the interval specified in the UI will be used.\n","supportedPlatforms":["Windows"],"tags":["Save","Publisher Options","Microsoft Publisher 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"pub16;L_SaveAutoRecoverinfoevery;L_SaveAutoRecoverinfoeveryID","uniqueId":4452,"displayName":"Minutes (range 1-120):","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to specify the Save Autorecover interval in minutes.\n\nIf you enable this policy setting, you may specify the Save Autorecover interval in minutes (valid range: 1-120).\n\nIf you disable or do not configure this policy setting, the interval specified in the UI will be used.\n","supportedPlatforms":["Windows"],"tags":["Save","Publisher Options","Microsoft Publisher 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"autorecoversaveinterval","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_Sendentirepublicationasasingle","uniqueId":4450,"displayName":"Send entire publication as a single JPEG image","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\internet","registrySubPath":"emailasimg","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_SetDefaultTextFlowDirection","uniqueId":4441,"displayName":"Set default text flow direction","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"pub16;L_SetDefaultTextFlowDirection;L_SetDefaultTextFlowDirectionDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to set the default text flow between Right-to-Left (RTL) and Left-to-Right (LTR). \n\nIf you enable this policy setting, you may choose whether text will flow RTL or LTR.\n\nIf you disable or not configure this policy setting, the default text flow setting is used.","supportedPlatforms":["Windows"],"tags":["Complex scripts","Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"pub16;L_SetDefaultTextFlowDirection;L_SetDefaultTextFlowDirectionDropID","uniqueId":4440,"displayName":"Set default text flow direction","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Left-to-Right","description":"","tags":[],"dependencyGroup":null},{"value":"256","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Right-to-Left","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"1","description":"This policy setting allows you to set the default text flow between Right-to-Left (RTL) and Left-to-Right (LTR). \n\nIf you enable this policy setting, you may choose whether text will flow RTL or LTR.\n\nIf you disable or not configure this policy setting, the default text flow setting is used.","supportedPlatforms":["Windows"],"tags":["Complex scripts","Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"defaulttextflow","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_SetMaximumNumberOfMRUItemsToDisplay","uniqueId":4435,"displayName":"Number of publications in the Recent Publications list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"pub16;L_SetMaximumNumberOfMRUItemsToDisplay;L_SetMaximumNumberOfMRUItemsToDisplaySpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the number of entries displayed in the Recent Publications list that appears when users click Open on the File tab in Backstage view.  \n\nIf you enable this policy setting, you can specify the number of entries to be between 0 and 50. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 25 items will be displayed in the Recent Publications list.\n\nNote: If you want to prevent items from being added to the Recent Publications list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"pub16;L_SetMaximumNumberOfMRUItemsToDisplay;L_SetMaximumNumberOfMRUItemsToDisplaySpinID","uniqueId":4434,"displayName":"Number of publications in the Recent Publications list","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":50},"dataType":"Integer"},"defaultValue":"25","description":"This policy setting specifies the number of entries displayed in the Recent Publications list that appears when users click Open on the File tab in Backstage view.  \n\nIf you enable this policy setting, you can specify the number of entries to be between 0 and 50. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 25 items will be displayed in the Recent Publications list.\n\nNote: If you want to prevent items from being added to the Recent Publications list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\file mru","registrySubPath":"max display","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"pub16;L_SetNumberOfPlacesInTheRecentPlacesList","uniqueId":4437,"displayName":"Number of folders in the Recent Folders list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"pub16;L_SetNumberOfPlacesInTheRecentPlacesList;L_SetNumberOfPlacesInTheRecentPlacesListSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the number of unpinned entries displayed in the Recent Folders list that appears when users click Open or Save As on the File tab in Backstage view.\n\nIf you enable this policy setting, you can specify the number of unpinned entries to be between 0 and 20. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 5 unpinned items are displayed in the Recent Folders list.\n\nNote: If you want to prevent items from being added to the Recent Folders list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"pub16;L_SetNumberOfPlacesInTheRecentPlacesList;L_SetNumberOfPlacesInTheRecentPlacesListSpinID","uniqueId":4436,"displayName":"Number of folders in the Recent Folders list","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":20},"dataType":"Integer"},"defaultValue":"5","description":"This policy setting specifies the number of unpinned entries displayed in the Recent Folders list that appears when users click Open or Save As on the File tab in Backstage view.\n\nIf you enable this policy setting, you can specify the number of unpinned entries to be between 0 and 20. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 5 unpinned items are displayed in the Recent Folders list.\n\nNote: If you want to prevent items from being added to the Recent Folders list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\place mru","registrySubPath":"max display","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"pub16;L_ShowScreenTipsonobjects","uniqueId":4448,"displayName":"Show ScreenTips on objects","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"showobjecttooltips","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_ShowTheNewTemplateGalleryWhenStartingPublisher","uniqueId":4432,"displayName":"Show the New template gallery when starting Publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["General","Publisher Options","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"usestartupdlg","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_TurnOffDragPreview","uniqueId":4433,"displayName":"Turn off drag preview","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to determine whether Publisher shows a semi-transparent drag preview or a simple outline of the object when the object is dragged.\n\nIf you enable this policy setting, only the outline of the object is shown while being dragged.  This is the recommended setting for older machines because of the resource requirements of this feature.\n\nIf you disable or do not configure this policy setting, a semi-transparent drag preview of the object is shown while being dragged.","supportedPlatforms":["Windows"],"tags":["Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"uselegacydrag","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"pub16;L_UseChinesefontsizes","uniqueId":4446,"displayName":"Use Chinese font sizes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"prcfontsizes","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_UseSequenceChecking","uniqueId":4485,"displayName":"Use sequence checking","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Complex scripts","Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"seqcheck","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_Usetypeandreplace","uniqueId":4486,"displayName":"Use type and replace","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Complex scripts","Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"typereplace","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_UseXPSEnhancedPrintPath","uniqueId":4438,"displayName":"Use XPS-enhanced print path","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"This policy setting allows you to use XPS-enhanced print path when available. \n\nIf you enable or do not configure this policy setting, the XPS print path will be used.\n\nIf you disable this policy setting, the XPS print path is not used.","supportedPlatforms":["Windows"],"tags":["Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"enablexpsprintpathprinting","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_VBAWarningsPolicy;L_empty0","uniqueId":4461,"displayName":"VBA Macro Notification Settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable all with notification","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable all except digitally signed macros","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable all without notification","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable all macros (not recommended)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":3,"recommendation":"security"}],"defaultValue":2,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n\nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Publisher 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\security","registrySubPath":"vbawarnings","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"pub16;L_VBAWarningsPolicy;L_VBADigSigTrustedPublishersStr","uniqueId":4462,"displayName":"Require macros to be signed by a trusted publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n\nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\security","registrySubPath":"vbadigsigtrustedpublishers","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"pub16;L_VBAWarningsPolicy;L_VBAOnlyAllowDigSigWithCodeSigningEKUStr","uniqueId":4464,"displayName":"Require Extended Key Usage (EKU) for certificates from trusted publishers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n\nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\security","registrySubPath":"vbarequiredigsigwithcodesigningeku","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"pub16;L_VBAWarningsPolicy;L_VBAOnlyAllowLMTrustedPublisherStr","uniqueId":4463,"displayName":"Block certificates from trusted publishers that are only installed in the current user certificate store","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n\nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\security","registrySubPath":"vbarequirelmtrustedpublisher","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"pub16;L_VBAWarningsPolicy","uniqueId":4465,"displayName":"VBA Macro Notification Settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"pub16;L_VBAWarningsPolicy;L_empty0","logicalOperator":"exists","values":null},{"dependee":"pub16;L_VBAWarningsPolicy;L_VBADigSigTrustedPublishersStr","logicalOperator":"exists","values":null},{"dependee":"pub16;L_VBAWarningsPolicy;L_VBAOnlyAllowLMTrustedPublisherStr","logicalOperator":"exists","values":null},{"dependee":"pub16;L_VBAWarningsPolicy;L_VBAOnlyAllowDigSigWithCodeSigningEKUStr","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n\nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Microsoft Publisher 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"pub16;L_Whenformattingautomaticallyformatentireword","uniqueId":4445,"displayName":"When formatting, automatically format entire word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"autowordformat","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"pub16;L_Whenselectingautomaticallyselectentireword","uniqueId":4444,"displayName":"When selecting, automatically select entire word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Publisher Options","Microsoft Publisher 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\publisher\\preferences","registrySubPath":"autowordsel","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"teams16;L_DeviceStoreBrowsePurchase;L_DeviceStoreBrowse","uniqueId":5397,"displayName":"Allow users to browse","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"The device store in the Teams App allows users to browse and purchase devices certified for Microsoft Teams. This policy controls whether users are allowed to purchase devices in the Teams device store.\n\nIf you enable this policy or do not configure this policy, users will be allowed to purchase devices in the Teams device store.\n\nIf you disable this policy, users will not be allowed to purchased devices from the Teams device store.\n\nFor more information see https://go.microsoft.com/fwlink/?linkid=2241615","supportedPlatforms":["Web"],"tags":["General","Cloud Policies Enum","Cloud Policies Composite","Cloud Policies","Cloud Policies","DeviceStoreBrowsePurchase"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\teams\\devicestore","registrySubPath":"isAllowedToBrowse","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"teams16;L_DeviceStoreBrowsePurchase;L_DeviceStorePurchase","uniqueId":5398,"displayName":"Allow users to purchase","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"The device store in the Teams App allows users to browse and purchase devices certified for Microsoft Teams. This policy controls whether users are allowed to purchase devices in the Teams device store.\n\nIf you enable this policy or do not configure this policy, users will be allowed to purchase devices in the Teams device store.\n\nIf you disable this policy, users will not be allowed to purchased devices from the Teams device store.\n\nFor more information see https://go.microsoft.com/fwlink/?linkid=2241615","supportedPlatforms":["Web"],"tags":["General","Cloud Policies Enum","Cloud Policies Composite","Cloud Policies","Cloud Policies","DeviceStoreBrowsePurchase"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Web"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\teams\\devicestore","registrySubPath":"isAllowedToPurchase","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"teams16;L_DeviceStoreBrowsePurchase","uniqueId":5396,"displayName":"Users can purchase devices in the Teams device store","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"teams16;L_DeviceStoreBrowsePurchase;L_DeviceStorePurchase","logicalOperator":"exists","values":[]}],"logicalOperator":1}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"The device store in the Teams App allows users to browse and purchase devices certified for Microsoft Teams. This policy controls whether users are allowed to purchase devices in the Teams device store.\n\nIf you enable this policy or do not configure this policy, users will be allowed to purchase devices in the Teams device store.\n\nIf you disable this policy, users will not be allowed to purchased devices from the Teams device store.\n\nFor more information see https://go.microsoft.com/fwlink/?linkid=2241615","supportedPlatforms":["Web"],"tags":["Cloud Policies","Cloud Policies","DeviceStoreBrowsePurchase"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"teams16;String_Teams_SignInRestriction_Policy;RestrictTeamsSignInToAccountsFromTenantList","uniqueId":5209,"displayName":"Tenant IDs:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to control the accounts that can be used in Teams on managed devices running Windows.  \n\nIf you enable this policy setting, users will only be allowed to sign in with accounts from Azure Active Directory (Azure AD) tenants that you specify. You can enter a comma separated list of tenant IDs.  \n \nThe policy setting applies to all ways that the user signs in, including first and additional accounts on versions of Teams that support multiple accounts side by side. \n\nThe policy setting is also enforced when users sign out and sign back in. \n\nIf you disable or don't configure this policy setting, Teams will continue to allow users to sign in with work or school accounts, or personal Microsoft accounts. \n\nImportant: This policy setting only restricts which users can sign in. It does not restrict the ability for users to be invited as a guest in other Azure AD tenants, or switch to tenants they were invited to.\n\nNote: This policy does not apply to Teams web app.","supportedPlatforms":["Windows"],"tags":["Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\teams","registrySubPath":"restrictteamssignintoaccountsfromtenantlist","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"teams16;String_Teams_SignInRestriction_Policy","uniqueId":5210,"displayName":"Restrict sign in to Teams to accounts in specific tenants","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"teams16;String_Teams_SignInRestriction_Policy;RestrictTeamsSignInToAccountsFromTenantList","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to control the accounts that can be used in Teams on managed devices running Windows.  \n\nIf you enable this policy setting, users will only be allowed to sign in with accounts from Azure Active Directory (Azure AD) tenants that you specify. You can enter a comma separated list of tenant IDs.  \n \nThe policy setting applies to all ways that the user signs in, including first and additional accounts on versions of Teams that support multiple accounts side by side. \n\nThe policy setting is also enforced when users sign out and sign back in. \n\nIf you disable or don't configure this policy setting, Teams will continue to allow users to sign in with work or school accounts, or personal Microsoft accounts. \n\nImportant: This policy setting only restricts which users can sign in. It does not restrict the ability for users to be invited as a guest in other Azure AD tenants, or switch to tenants they were invited to.\n\nNote: This policy does not apply to Teams web app.","supportedPlatforms":["Windows"],"tags":["Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"teams16;Teams_PreventFirstLaunchAfterInstall_Policy","uniqueId":5208,"displayName":"Prevent Microsoft Teams from starting automatically after installation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether Microsoft Teams starts automatically when the user logs into a device after Teams is installed.\n\nIf you enable this policy setting, Teams does not start automatically when the user logs in to the device and the user has not started Teams previously.\n\nNote: If you enable this policy setting, you must do so before Teams is installed.\n\nOnce a user starts Teams for the first time, Teams is configured to start automatically the next time the user logs into the device.\n\nIf you disable or don’t configure this policy setting, Teams automatically starts when a user logs in to the device after Teams is installed.\n\nNote: The user can configure Teams not to start automatically by configuring user settings within Teams.","supportedPlatforms":["Windows"],"tags":["Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\teams","registrySubPath":"preventfirstlaunchafterinstall","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_Addons","uniqueId":4680,"displayName":"Add-ons","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_Addons;L_Addonscolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Displays the additional location of macros and add-ons.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_Addons;L_Addonscolon","uniqueId":4679,"displayName":"Add-ons:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Displays the additional location of macros and add-ons.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"addonspath","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_AllowTrustedLocationsOnTheNetwork","uniqueId":4555,"displayName":"Allow Trusted Locations on the network","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting controls whether trusted locations on the network can be used.\n\nIf you enable this policy setting, users can specify trusted locations on network shares or in other remote locations that are not under their direct control by clicking the \"Add new location\" button in the Trusted Locations section of the Trust Center. Content, code, and add-ins are allowed to load from trusted locations with minimal security and without prompting the user for permission.\n\nIf you disable this policy setting, the selected application ignores any network locations listed in the Trusted Locations section of the Trust Center. \n\nIf you also deploy Trusted Locations via Group Policy, you should verify whether any of them are remote locations. If any of them are remote locations and you do not allow remote locations via this policy setting, those policy keys that point to remote locations will be ignored on client computers.\n\nDisabling this policy setting does not delete any network locations from the Trusted Locations list, but causes disruption for users who add network locations to the Trusted Locations list. Users are also prevented from adding new network locations to the Trusted Locations list in the Trust Center.  We recommended that you do not enable this policy setting (as the \"Allow Trusted Locations on my network (not recommended)\" check box also states). Therefore, in practice, it should be possible to disable this policy setting in most situations without causing significant usability issues for most users.\n\nIf you do not enable this policy setting, users can select the \"Allow Trusted Locations on my network (not recommended)\" check box if desired and then specify trusted locations by clicking the \"Add new location\" button.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations","registrySubPath":"allownetworklocations","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_AlwaysofferMetricandUSunitsfornewblankdrawings","uniqueId":4511,"displayName":"Always offer 'Metric' and 'US units' for new blank drawings and stencils","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"This policy setting will allow the showing of both US Units and Metric Units when you create a new blank drawing or stencil.\n\nIf you enable this policy setting, both US Units and Metric Units are shown as a choice before you create a new blank drawing or stencil. These drawings open with the appropriate rulers and page setup and use the appropriate units for the drawing tools.  This does not install the templates and stencils in both unit types.  This policy setting is always enabled whenever the Developer Tab is turned on.\n\nIf you disable or do not configure this policy setting, you are not shown a choice between units when creating a blank drawing or stencil if templates and stencils of only one type of unit are installed.","supportedPlatforms":["Windows"],"tags":["Display","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"offermetricandus","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Angle","uniqueId":4508,"displayName":"Angle","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_Angle;L_angle8","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the unit of measure for the angle of rotation.","supportedPlatforms":["Windows"],"tags":["Display","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_Angle;L_angle8","uniqueId":4507,"displayName":"Angle","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"81","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Degrees","description":"","tags":[],"dependencyGroup":null},{"value":"82","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Deg-Min-Sec","description":"","tags":[],"dependencyGroup":null},{"value":"84","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Min-Sec","description":"","tags":[],"dependencyGroup":null},{"value":"85","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Seconds","description":"","tags":[],"dependencyGroup":null},{"value":"83","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Radians","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"81","description":"Specifies the unit of measure for the angle of rotation.","supportedPlatforms":["Windows"],"tags":["Display","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\document","registrySubPath":"measurementsystem_angle","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_BlockAllUnmanagedAddins","uniqueId":4706,"displayName":"Block all unmanaged add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting blocks all add-ins that are not managed by the \"List of managed add-ins\" policy setting.\n\nIf you enable this policy setting, and the \"List of managed add-ins\" policy setting is also enabled, all add-ins are blocked except those that are configured as 1 (always enabled) or 2 (configurable by the user) in the \"List of managed add-ins\" policy setting.\n\nIf you disable or do not configure this policy setting, users can enable or disable any add-ins that are not managed by the \"List of managed add-ins\" policy setting.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\resiliency","registrySubPath":"restricttolist","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_BlockMacroExecutionFromInternet","uniqueId":4541,"displayName":"Block macros from running in Office files from the internet","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"\n        This policy setting allows you to block macros from running in Office files that come from the internet.\n\n        If you enable this policy setting, macros are blocked from running, even if \"Enable all macros\" is selected in the Macro Settings section of the Trust Center. Users will receive a notification that macros are blocked from running.\n\n        The exceptions when macros will be allowed to run are:\n        - The Office file is saved to a Trusted Location.\n        - The Office file was previously trusted by the user.\n        - Macros are digitally signed and the matching Trusted Publisher certificate is installed on the device.\n\n        If you disable this policy setting, the settings configured in the Macro Settings section of the Trust Center determine whether macros run in Office files that come from the internet.\n\n        If you don’t configure this policy setting, macros will be blocked from running. Users will receive a notification telling them of the security risks of macros from the internet along with a link to learn more.\n\n        For more information, see https://go.microsoft.com/fwlink/p/?linkid=2185771.\n      ","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security","registrySubPath":"blockcontentexecutionfrominternet","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_Centerselectiononzoom","uniqueId":4516,"displayName":"Center selection on zoom","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Specifies that when you zoom in, whatever shape was selected appears in the center of the window.","supportedPlatforms":["Windows"],"tags":["Editing Options","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"zoommode","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_DefaultBuiltInTab","uniqueId":4717,"displayName":"Default tab to show in Visio on the Office Start screen and in File | New","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_DefaultBuiltInTab;L_DefaultBuiltInTab","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls what displays as the default tab in Visio on the Office Start screen and in File | New. \n\nIf you enable this policy setting, you can choose one of two options to become the default tab on the Office Start screen and in File | New:\n\n* Built-in – Users will the see built-in templates tab as the default tab in Visio on the Office Start screen and in File | New.\n\n* Custom – Users will the see custom templates tab as the default tab in Visio on the Office Start screen and in File | New when templates exist (this can include Custom XML programmed templates, templates in the Workgroup templates path, templates in the Personal templates path, or SharePoint templates).\n\nIf you disable or do not configure this policy setting, users will see the Featured templates tab as the default tab in Visio on the Office Start screen and in File | New","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_DefaultBuiltInTab;L_DefaultBuiltInTab","uniqueId":4716,"displayName":"Default tab to show in Visio on the Office Start screen and in File | New","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Featured","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Built-in","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Custom","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting controls what displays as the default tab in Visio on the Office Start screen and in File | New. \n\nIf you enable this policy setting, you can choose one of two options to become the default tab on the Office Start screen and in File | New:\n\n* Built-in – Users will the see built-in templates tab as the default tab in Visio on the Office Start screen and in File | New.\n\n* Custom – Users will the see custom templates tab as the default tab in Visio on the Office Start screen and in File | New when templates exist (this can include Custom XML programmed templates, templates in the Workgroup templates path, templates in the Personal templates path, or SharePoint templates).\n\nIf you disable or do not configure this policy setting, users will see the Featured templates tab as the default tab in Visio on the Office Start screen and in File | New","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Visio 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"officestartdefaulttab","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_Disableallapplicationextensions","uniqueId":4540,"displayName":"Disable all application add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting disables all add-ins for the specified Office 2016 applications.\n     \nIf you enable this policy setting, all add-ins for the specified Office 2016 applications are disabled.\n\nIf you disable or do not configure this policy setting, all add-ins for the specified Office 2016 applications are allowed to run without notifying the users, except if application add-ins are required to be signed by Trusted Publishers.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security","registrySubPath":"disablealladdins","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_Disablecommandbarbuttonsandmenuitems1","uniqueId":4701,"displayName":"Disable commands","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_Disablecommandbarbuttonsandmenuitems1;L_EnteracommandbarIDtodisable","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable any command bar button and menu item with a command bar ID, including command bar buttons and menu items that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, all default command bar buttons or menu items are available to users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Visio 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_Disablecommandbarbuttonsandmenuitems1;L_EnteracommandbarIDtodisable","uniqueId":4700,"displayName":"Enter a command bar ID to disable","settingType":{"possibleValues":{"possibleValuesType":"List","ValueType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to disable any command bar button and menu item with a command bar ID, including command bar buttons and menu items that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, all default command bar buttons or menu items are available to users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Visio 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\disabledcmdbaritemslist","registryPath":"TCID","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Disablecommandbarbuttonsandmenuitems","uniqueId":4699,"displayName":"Disable predefined commands","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_Disablecommandbarbuttonsandmenuitems;L_FileSendToMailRecipient","logicalOperator":"exists","values":null},{"dependee":"visio16;L_Disablecommandbarbuttonsandmenuitems;L_InsertHyperlink","logicalOperator":"exists","values":null},{"dependee":"visio16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacrosMacros","logicalOperator":"exists","values":null},{"dependee":"visio16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacrosVisualBasicEditor","logicalOperator":"exists","values":null},{"dependee":"visio16;L_Disablecommandbarbuttonsandmenuitems;L_VisioOptions99","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specify command bar buttons and menu items to disable.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_Disablecommandbarbuttonsandmenuitems;L_FileSendToMailRecipient","uniqueId":4694,"displayName":"File Tab | Share | Email","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"2188","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"Specify command bar buttons and menu items to disable.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\disabledcmdbaritemscheckboxes","registrySubPath":"filesendtomailrecipient","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Disablecommandbarbuttonsandmenuitems;L_InsertHyperlink","uniqueId":4695,"displayName":"Insert | Hyperlinks...","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1576","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"Specify command bar buttons and menu items to disable.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\disabledcmdbaritemscheckboxes","registrySubPath":"inserthyperlink","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacrosMacros","uniqueId":4696,"displayName":"Developer tab | Macros","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"186","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"Specify command bar buttons and menu items to disable.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacrosmacros","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacrosVisualBasicEditor","uniqueId":4697,"displayName":"Developer tab | Visual Basic","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1695","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"Specify command bar buttons and menu items to disable.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacrosvbe","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Disablecommandbarbuttonsandmenuitems;L_VisioOptions99","uniqueId":4698,"displayName":"File tab | Options","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"11323","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"Specify command bar buttons and menu items to disable.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsoptions","registryType":"REG_SZ","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\disabledcmdbaritemscheckboxes","registrySubPath":"weboptions","enforcedValues":{"enabled":"4107","disabled":null}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\disabledcmdbaritemscheckboxes","registrySubPath":"generaloptions","enforcedValues":{"enabled":"4108","disabled":null}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\disabledcmdbaritemscheckboxes","registrySubPath":"weboptions","enforcedValues":{"enabled":"4107","disabled":null}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\disabledcmdbaritemscheckboxes","registrySubPath":"generaloptions","enforcedValues":{"enabled":"4108","disabled":null}}]}}},{"id":"visio16;L_DisableOfficeStartVisio","uniqueId":4713,"displayName":"Disable the Office Start screen for Visio","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the Office Start screen appears on boot for Visio.\n\nIf you enable this policy setting, users will not see the Office Start screen when they boot Visio.\n\nIf you disable or do not configure this policy setting, users will see the Office Start screen when they boot Visio.\n\nNote: This policy setting is overridden by the policy setting \"Microsoft Office 2016 > Miscellaneous > Disable the Office Start screen for all Office applications\" if that policy setting is set.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"disableboottoofficestart","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_disableshortcutkeys100","uniqueId":4703,"displayName":"Disable shortcut keys","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_disableshortcutkeys100;L_Enterakeyandmodifiertodisable","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specify the virtual key code and modifier for the shortcut key to disable.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Visio 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_disableshortcutkeys100;L_Enterakeyandmodifiertodisable","uniqueId":4702,"displayName":"Enter a key and modifier to disable","settingType":{"possibleValues":{"possibleValuesType":"List","ValueType":"string"},"dataType":"Collection"},"description":"Specify the virtual key code and modifier for the shortcut key to disable.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Visio 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\disabledshortcutkeyslist","registryPath":"KeyMod","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_DisableTrustBarNotificationforunsigned","uniqueId":4554,"displayName":"Disable Trust Bar Notification for unsigned application add-ins and block them","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable such add-ins without notification. This policy setting only applies if you enable the \"Require that application add-ins are signed by Trusted Publisher\" policy setting, which prevents users from changing this policy setting.\n\nIf you enable this policy setting, applications automatically disable unsigned add-ins without informing users.\n \nIf you disable this policy setting, if this application is configured to require that all add-ins be signed by a trusted publisher, any unsigned add-ins the application loads will be disabled and the application will display the Trust Bar at the top of the active window. The Trust Bar contains a message that informs users about the unsigned add-in.\n\nIf you do not configure this policy setting, the disable behavior applies, and in addition, users can configure this requirement themselves in the \"Add-ins\" category of the Trust Center for the application.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security","registrySubPath":"notbpromptunsignedaddin","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_DisableTrustedLoc","uniqueId":4556,"displayName":"Disable all trusted locations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows administrators to disable all trusted locations in the 2016 versions of the specified applications. Trusted locations specified in the Trust Center are used to define file locations that are assumed to be safe. Content, code, and add-ins are allowed to load from trusted locations with a minimal amount of security, without prompting the users for permission. If a dangerous file is opened from a trusted location, it will not be subject to standard security measures and could harm users' computers or data.\n \nIf you enable this policy setting, all trusted locations (those specified in the Trust Center) in the 2016 versions of the specified applications are ignored, including any trusted locations established by Office during setup, deployed to users using Group Policy, or added by users themselves.  Users will be prompted again when opening files from trusted locations.\n\nIf you disable or do not configure this policy setting, all trusted locations (those specified in the Trust Center) in the 2016 versions of the specified applications are assumed to be safe.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations","registrySubPath":"alllocationsdisabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_DisableVisioRnRPane","uniqueId":4718,"displayName":"Turn off Research and Translation features in Visio","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\n        This policy setting controls whether the Research and Translation features appear in Visio.\n\n        If you enable this policy setting, users won’t see the Research and Translation features in Visio.\n\n        If you disable or don't configure this policy setting, users will see the Research and Translation features in Visio.\n\n        Note: This policy setting only applies to Visio LTSC 2021.\n      ","supportedPlatforms":["Windows"],"tags":["Proofing","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"disablevisiornrpane","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_DisplayDeveloperTab","uniqueId":4528,"displayName":"Display Developer tab in the Ribbon","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the Developer tab will be displayed in the Ribbon.\n\nIf you enable this policy setting, the Developer tab will be displayed in the Ribbon.\n\nIf you disable this policy setting, the Developer tab will not be displayed in the Ribbon.\n\nIf you do not configure this policy setting, the Developer tab will not be displayed in the Ribbon, but its visibility can be changed via a setting in the application Options dialog box.","supportedPlatforms":["Windows"],"tags":["Customize Ribbon","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"developertools","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_DoNotShowMiniToolbarOnSelectionOfText","uniqueId":4512,"displayName":"Do not show Mini Toolbar on selection of text","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"This policy setting allows you to configure the Mini Toolbar on selection of text.\n\nIf you enable this policy setting, the Mini Toolbar is not shown on selection.\n\nIf you disable or do not configure this policy setting, the Mini Toolbar is shown on selection.","supportedPlatforms":["Windows"],"tags":["User Interface Options","General","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"showminitoolbar","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Drawings","uniqueId":4672,"displayName":"Drawings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_Drawings;L_Drawingscolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Displays the additional location of drawings. When you add a location here, it becomes the default save location.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_Drawings;L_Drawingscolon","uniqueId":4671,"displayName":"Drawings:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Displays the additional location of drawings. When you add a location here, it becomes the default save location.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"drawingspath","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Duration","uniqueId":4510,"displayName":"Duration","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_Duration;L_duration9","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the unit of measure for duration, which is elapsed time as compared to a specific date or a given hour.","supportedPlatforms":["Windows"],"tags":["Display","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_Duration;L_duration9","uniqueId":4509,"displayName":"Duration","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"43","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Weeks","description":"","tags":[],"dependencyGroup":null},{"value":"44","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Days","description":"","tags":[],"dependencyGroup":null},{"value":"45","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hours","description":"","tags":[],"dependencyGroup":null},{"value":"46","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Minutes","description":"","tags":[],"dependencyGroup":null},{"value":"47","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Seconds","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"43","description":"Specifies the unit of measure for duration, which is elapsed time as compared to a specific date or a given hour.","supportedPlatforms":["Windows"],"tags":["Display","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\document","registrySubPath":"measurementsystem_duration","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_EmailmessageforSendtocommands","uniqueId":4705,"displayName":"Email message for 'Send To' commands","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_EmailmessageforSendtocommands;L_emailmessageforsendtocommands101","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Command in the Send To submenu of the File menu.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_EmailmessageforSendtocommands;L_emailmessageforsendtocommands101","uniqueId":4704,"displayName":"Email message for 'Send To' commands","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Command in the Send To submenu of the File menu.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"sendtoemailmsgstring","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_EnableAutoConnect","uniqueId":4520,"displayName":"Enable AutoConnect","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Editing Options","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"enableautoconnect","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_EnableAutomationevents","uniqueId":4670,"displayName":"Enable Automation events","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Enables Visio events to be sent to Visio add-ons and VBA macros. If cleared, disables all Visio events. If you clear this option, some drawing types in Visio that rely on Automation events may not have full functionality.","supportedPlatforms":["Windows"],"tags":["General Options","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"eventsenabled","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Enablelivedynamics","uniqueId":4518,"displayName":"Enable live dynamics","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"When you resize or rotate a shape, you can see the shape as it is being transformed, instead of just seeing the bounding box until the action is complete","supportedPlatforms":["Windows"],"tags":["Editing Options","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"livemousedynamics","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_EnableMicrosoftVisualBasicforApplicationsproject","uniqueId":4664,"displayName":"Enable Microsoft Visual Basic for Applications project creation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Enables creations of VBA projects when you open (or create) a document that does not already contain a project. If you clear this check box, you will not be able to create a macro in a document that does not already contain a project.","supportedPlatforms":["Windows"],"tags":["Macro Security","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"createvbaprojects","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Enalbeconnectorsplitting","uniqueId":4519,"displayName":"Enable connector splitting","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"When you place a shape on the line of a connector, it splits and each piece becomes a separate connector glued to the shape. Not all drawing types support connector splitting.","supportedPlatforms":["Windows"],"tags":["Editing Options","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"allowshapesplitting","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_FavoritesStencilName","uniqueId":4686,"displayName":"Favorites Stencil Name","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_FavoritesStencilName;L_FavoritesStencilNamecolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Displays the name of the stencil created in the My Shapes folder that contains a user's favorite shapes.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_FavoritesStencilName;L_FavoritesStencilNamecolon","uniqueId":4685,"displayName":"Favorites Stencil Name:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Displays the name of the stencil created in the My Shapes folder that contains a user's favorite shapes.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"favoritesstencilname","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Fractionswithfractioncharacter","uniqueId":4688,"displayName":"Fractions with fraction character","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["AutoCorrect Options","Proofing","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\autoformat as you type","registrySubPath":"fractions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_Help","uniqueId":4678,"displayName":"Help","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_Help;L_Helpcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Displays the additional location of Help files.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_Help;L_Helpcolon","uniqueId":4677,"displayName":"Help:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Displays the additional location of Help files.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"helppath","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Hyphenswithdash","uniqueId":4690,"displayName":"Hyphens with dash","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["AutoCorrect Options","Proofing","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\autoformat as you type","registrySubPath":"dashes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_languageforfileconversion4","uniqueId":4525,"displayName":"Language for file conversion","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_languageforfileconversion4;L_languageforfileconversion5","logicalOperator":"exists","values":null},{"dependee":"visio16;L_languageforfileconversion4;L_Uselanguage","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies how Visio determines what language to use when converting to or from an earlier version of Visio.  \n\nIf you enable this policy setting, you may select from one of these options:\n\n- Let Visio decide language\n- Prompt for language\n- Use the following language: You must specify the numeric Microsoft Locale ID (LCID) for that language.\n\nIf you disable or do not configure this policy setting, Visio decides what language to use.","supportedPlatforms":["Windows"],"tags":["Save/Open","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_languageforfileconversion4;L_languageforfileconversion5","uniqueId":4523,"displayName":"Language for file conversion","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Let Visio decide language","description":"","tags":[],"dependencyGroup":null},{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt for language","description":"","tags":[],"dependencyGroup":null},{"value":"2","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use the following language","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting specifies how Visio determines what language to use when converting to or from an earlier version of Visio.  \n\nIf you enable this policy setting, you may select from one of these options:\n\n- Let Visio decide language\n- Prompt for language\n- Use the following language: You must specify the numeric Microsoft Locale ID (LCID) for that language.\n\nIf you disable or do not configure this policy setting, Visio decides what language to use.","supportedPlatforms":["Windows"],"tags":["Save/Open","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"fileconversionmode","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_languageforfileconversion4;L_Uselanguage","uniqueId":4524,"displayName":"Use language:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting specifies how Visio determines what language to use when converting to or from an earlier version of Visio.  \n\nIf you enable this policy setting, you may select from one of these options:\n\n- Let Visio decide language\n- Prompt for language\n- Use the following language: You must specify the numeric Microsoft Locale ID (LCID) for that language.\n\nIf you disable or do not configure this policy setting, Visio decides what language to use.","supportedPlatforms":["Windows"],"tags":["Save/Open","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"fileconversionlanguage","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Listoferrormessagestocustomize","uniqueId":4693,"displayName":"List of error messages to customize","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_Listoferrormessagestocustomize;L_listoferrormessagestocustomize98","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines a list of custom error messages to activate.","supportedPlatforms":["Windows"],"tags":["Customizable Error Messages","Microsoft Visio 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\customizablealerts","registrySubPath":"policyon","enforcedValues":{"enabled":1}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\customizablealerts","registrySubPath":"policyon","enforcedValues":{"enabled":1}}]}}},{"id":"visio16;L_Listoferrormessagestocustomize;L_listoferrormessagestocustomize98","uniqueId":4692,"displayName":"List of error messages to customize","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"Defines a list of custom error messages to activate.","supportedPlatforms":["Windows"],"tags":["Customizable Error Messages","Microsoft Visio 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\customizablealerts","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_ListOfManagedAddins","uniqueId":4708,"displayName":"List of managed add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_ListOfManagedAddins;L_ListOfManagedAddins2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify which add-ins are always enabled, always disabled (blocked), or configurable by the user. To block add-ins that are not managed by this policy setting, you must also configure the \"Block all unmanaged add-ins\" policy setting.\n\nTo enable this policy setting, provide the following information for each add-in:\n\nIn \"Value name,\" specify the programmatic identifier (ProgID) for COM add-ins.\n\nTo obtain the ProgID for an add-in, use Registry Editor on the client computer where the add-in is installed to locate key names under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Visio\\Addins or HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Visio\\Addins.\n\nYou can also obtain the ProgID of an add-in by using Office Telemetry Dashboard.\n\nIn \"Value,\" specify the value as follows:\n\nTo specify that an add-in is always disabled (blocked), type 0.\n\nTo specify that an add-in is always enabled, type 1.\n\nTo specify that an add-in is configurable by the user and not blocked by the \"Block all unmanaged add-ins\" policy setting when enabled, type 2.\n\nIf you disable or do not enable this policy setting, the list of managed add-ins is deleted. If the \"Block all unmanaged add-ins\" policy setting is enabled, then all add-ins are blocked.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Visio 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\resiliency\\addinlist","registrySubPath":"policyon","enforcedValues":{"enabled":1}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\resiliency\\addinlist","registrySubPath":"policyon","enforcedValues":{"enabled":1}}]}}},{"id":"visio16;L_ListOfManagedAddins;L_ListOfManagedAddins2","uniqueId":4707,"displayName":"List of managed add-ins","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to specify which add-ins are always enabled, always disabled (blocked), or configurable by the user. To block add-ins that are not managed by this policy setting, you must also configure the \"Block all unmanaged add-ins\" policy setting.\n\nTo enable this policy setting, provide the following information for each add-in:\n\nIn \"Value name,\" specify the programmatic identifier (ProgID) for COM add-ins.\n\nTo obtain the ProgID for an add-in, use Registry Editor on the client computer where the add-in is installed to locate key names under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Visio\\Addins or HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Visio\\Addins.\n\nYou can also obtain the ProgID of an add-in by using Office Telemetry Dashboard.\n\nIn \"Value,\" specify the value as follows:\n\nTo specify that an add-in is always disabled (blocked), type 0.\n\nTo specify that an add-in is always enabled, type 1.\n\nTo specify that an add-in is configurable by the user and not blocked by the \"Block all unmanaged add-ins\" policy setting when enabled, type 2.\n\nIf you disable or do not enable this policy setting, the list of managed add-ins is deleted. If the \"Block all unmanaged add-ins\" policy setting is enabled, then all add-ins are blocked.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Visio 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\resiliency\\addinlist","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_LoadMicrosoftVisualBasicforApplicationsprojectsf","uniqueId":4663,"displayName":"Load Microsoft Visual Basic for Applications projects from text","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"If you want to be able to have your VBA project work in drawings created in other versions of Visio, select this option so that your VBA project is compiled when the file is loaded, but the compiled project is never saved.","supportedPlatforms":["Windows"],"tags":["Macro Security","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"loadvbaprojectsfromtext","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_MyShapes","uniqueId":4684,"displayName":"My Shapes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_MyShapes;L_MyShapescolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Displays the path of the My Shapes folder.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_MyShapes;L_MyShapescolon","uniqueId":4683,"displayName":"My Shapes:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Displays the path of the My Shapes folder.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"myshapespath","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_OfficeFileBlockIncludeTrustedFiles","uniqueId":5399,"displayName":"File Block includes trusted files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy setting controls whether File Block settings for a file type apply to Trusted Files of the same file type.\n\nIf you enable this policy setting, Trusted Files will have to follow what the File Block setting is for the given file type.\n\nIf you disable or do not configure this policy setting, Trusted Files will not follow the File Block setting for the given file type.","supportedPlatforms":["Windows"],"tags":["OfficeFileBlockIncludeTrustedFiles","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\fileblock","registrySubPath":"IncludeTrustedFiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_OpeneachShapeSheetinthesamewindow","uniqueId":4668,"displayName":"Open each ShapeSheet in the same window","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Opens multiple ShapeSheets in the same window rather than displaying each ShapeSheet in its own window.","supportedPlatforms":["Windows"],"tags":["General Options","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\document","registrySubPath":"recycleshapesheetwindow","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Openresultsnewwindow","uniqueId":4539,"displayName":"Open results new window","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Indicates whether a new search results stencil is created for every search. If cleared, the results of a search replace the results of any previous search.","supportedPlatforms":["Windows"],"tags":["Shape Search","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"msoridcuvisiobfsrecycle","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Ordinalswithsuperscript","uniqueId":4689,"displayName":"Ordinals with superscript","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["AutoCorrect Options","Proofing","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\autoformat as you type","registrySubPath":"ordinals","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_PersonalTemplatesPath","uniqueId":4715,"displayName":"Personal templates path for Visio","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_PersonalTemplatesPath;L_PersonalTemplatesPath","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the location of a user's personal templates. \n\nIf you enable this policy setting, users will see any templates they have saved in the specified location in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will change to be the specified location. \n\nIf you disable or do not configure this policy setting, users will not see templates they have saved in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will be their document save location.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_PersonalTemplatesPath;L_PersonalTemplatesPath","uniqueId":4714,"displayName":"Personal templates path for Visio","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting specifies the location of a user's personal templates. \n\nIf you enable this policy setting, users will see any templates they have saved in the specified location in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will change to be the specified location. \n\nIf you disable or do not configure this policy setting, users will not see templates they have saved in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will be their document save location.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"personaltemplates","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_PreventShowingNewScreenOnLaunch","uniqueId":4497,"displayName":"Prevent showing New screen on launch","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"This policy setting allows you to prevent the New screen to be shown on launch of Visio.\n\nIf you enable this policy setting, the New screen will not be shown on launch.\n\nIf you disable or do not configure this policy setting, the New screen, including a catalog of templates, is shown when you open Visio.","supportedPlatforms":["Windows"],"tags":["Display","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"showtemplatepanebydefault","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Promptfordocumentpropertiesonfirstsave","uniqueId":4522,"displayName":"Prompt for document properties on first save","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Indicates whether the properties dialog box opens when a file is saved for the first time. File properties include author name and information such as the status of the file, preview settings and other properties.","supportedPlatforms":["Windows"],"tags":["Save Documents","Save","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"promptforsummaryinfo","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_PutallsettingsinWindowsregistry","uniqueId":4669,"displayName":"Put all settings in Windows registry","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Adds all possible application settings into the Windows registry. By default, only certain settings are added (non-default settings and very few others, such as file paths, import and export filters, and last files) to keep the registry settings simple.","supportedPlatforms":["Windows"],"tags":["General Options","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"putallinregistry","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Recentlyusedfilelist;L_Numberofentries","uniqueId":4709,"displayName":"Number of entries: ","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":50},"dataType":"Integer"},"defaultValue":"25","description":"This policy setting specifies the number of entries displayed in the Recent Drawings list that appears when users click Open on the File tab in Backstage view.  \n\nIf you enable this policy setting, you can specify the number of entries to be between 0 and 50. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 25 items will be displayed in the Recent Drawings list.\n\nNote: If you want to prevent items from being added to the Recent Drawings list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["Display","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\file mru","registrySubPath":"max display","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_Recentlyusedfilelist","uniqueId":4710,"displayName":"Number of entries in the Recent Drawings list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_Recentlyusedfilelist;L_Numberofentries","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the number of entries displayed in the Recent Drawings list that appears when users click Open on the File tab in Backstage view.  \n\nIf you enable this policy setting, you can specify the number of entries to be between 0 and 50. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 25 items will be displayed in the Recent Drawings list.\n\nNote: If you want to prevent items from being added to the Recent Drawings list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["Display","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_RequirethatApplicationExtensionsaresigned","uniqueId":4553,"displayName":"Require that application add-ins are signed by Trusted Publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting controls whether add-ins for this applications must be digitally signed by a trusted publisher.\n \nIf you enable this policy setting, this application checks the digital signature for each add-in before loading it. If an add-in does not have a digital signature, or if the signature did not come from a trusted publisher, this application disables the add-in and notifies the user. Certificates must be added to the Trusted Publishers list if you require that all add-ins be signed by a trusted publisher. For detail on about obtaining and distributing certificates, see http://go.microsoft.com/fwlink/?LinkId=294922. Office 2016 stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store.  Office 2016 still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store. Therefore, if you created a list of trusted publishers in a previous version of Office and you upgrade to Office 2016, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store. For more information about trusted publishers, see the Office Resource Kit.\n\nIf you disable or do not configure this policy setting, this application does not check the digital signature on application add-ins before opening them. If a dangerous add-in is loaded, it could harm users' computers or compromise data security.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security","registrySubPath":"requireaddinsig","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_SaveCheckedOutFilesTo","uniqueId":4531,"displayName":"Save checked-out files to","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_SaveCheckedOutFilesTo;L_SaveCheckedOutFilesToDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to choose if checked-out files are saved to the server drafts location or the web server. \n\nIf you enable this policy setting, you can choose where checked-out files are saved:\n- Server drafts location: The server drafts location on this computer\n- Web server: The web server\n\nIf you disable or do not configure this policy setting, checked-out files are stored in the server drafts location.","supportedPlatforms":["Windows"],"tags":["Offline Editing","Save","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_SaveCheckedOutFilesTo;L_SaveCheckedOutFilesToDropID","uniqueId":4530,"displayName":"Save checked-out files to","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Server drafts location","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Web server","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"1","description":"This policy setting allows you to choose if checked-out files are saved to the server drafts location or the web server. \n\nIf you enable this policy setting, you can choose where checked-out files are saved:\n- Server drafts location: The server drafts location on this computer\n- Web server: The web server\n\nIf you disable or do not configure this policy setting, checked-out files are stored in the server drafts location.","supportedPlatforms":["Windows"],"tags":["Offline Editing","Save","Visio Options","Microsoft Visio 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"uselocaldrafts","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_SaveVisiofilesas","uniqueId":4533,"displayName":"Save Visio files as","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_SaveVisiofilesas;L_savevisiofilesas6","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Identifies the default file format in which Visio files are saved.","supportedPlatforms":["Windows"],"tags":["Save Documents","Save","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_SaveVisiofilesas;L_savevisiofilesas6","uniqueId":4532,"displayName":"Save Visio files as","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Visio Document","description":"","tags":[],"dependencyGroup":null},{"value":"3","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Visio Macro-Enabled Document","description":"","tags":[],"dependencyGroup":null},{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Visio 2003-2016 Document","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"Identifies the default file format in which Visio files are saved.","supportedPlatforms":["Windows"],"tags":["Save Documents","Save","Visio Options","Microsoft Visio 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"savefileformat","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Searchfor","uniqueId":4536,"displayName":"Search for:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_Searchfor;L_searchfor10","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Shape Search","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_Searchfor;L_searchfor10","uniqueId":4535,"displayName":"Search for:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"All of the words (AND)","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Any of the words (OR)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"1","description":"Sets the value in the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Shape Search","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"findshapesallwords","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Searchresults","uniqueId":4538,"displayName":"Search results","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_Searchresults;L_searchresults11","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies whether results are returned in alphabetical order by shape name or by stencil name (group). Click By Group to help distinguish between shapes that have the same name but appear on different stencils. Selecting this option is also useful if you want to locate the stencil containing the shape.","supportedPlatforms":["Windows"],"tags":["Shape Search","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_Searchresults;L_searchresults11","uniqueId":4537,"displayName":"Search results","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Alphabetically","description":"","tags":[],"dependencyGroup":null},{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"By Group","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"Specifies whether results are returned in alphabetical order by shape name or by stencil name (group). Click By Group to help distinguish between shapes that have the same name but appear on different stencils. Selecting this option is also useful if you want to locate the stencil containing the shape.","supportedPlatforms":["Windows"],"tags":["Shape Search","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"msoridcuvisiobfsgroup","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Selectshapespartiallywithinarea","uniqueId":4517,"displayName":"Select shapes partially within area","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"If you select shapes by using a selection net(dragging a box around shapes on the drawing page), you can change the selection settings to also include shapes that are partially within the selection net.","supportedPlatforms":["Windows"],"tags":["Editing Options","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"areaselection","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_SetMaximumNumberOfTrustedDocuments","uniqueId":4545,"displayName":"Set maximum number of trusted documents","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_SetMaximumNumberOfTrustedDocuments;L_SetMaximumNumberOfTrustedDocumentsSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the maximum number of trust records for trusted documents that can be stored in the registry before the purge task runs. The purge task reduces the number of trusted documents stored in the registry to the value set by the \"Set maximum number of trust records to preserve\" policy setting.\n\nIf you enable this policy setting, you can specify the maximum number of trusted documents to be stored in the registry before the purge task runs, with an upper limit of 20,000 documents. For performance reasons, we do not recommend setting this policy setting to the upper limit.\n\nIf you disable or do not configure this policy setting, the default value of 500 is used for the maximum number of trusted documents that can be stored in the registry before the purge task runs.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_SetMaximumNumberOfTrustedDocuments;L_SetMaximumNumberOfTrustedDocumentsSpinID","uniqueId":4544,"displayName":"Maximum number:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":20000},"dataType":"Integer"},"defaultValue":"500","description":"This policy setting allows you to specify the maximum number of trust records for trusted documents that can be stored in the registry before the purge task runs. The purge task reduces the number of trusted documents stored in the registry to the value set by the \"Set maximum number of trust records to preserve\" policy setting.\n\nIf you enable this policy setting, you can specify the maximum number of trusted documents to be stored in the registry before the purge task runs, with an upper limit of 20,000 documents. For performance reasons, we do not recommend setting this policy setting to the upper limit.\n\nIf you disable or do not configure this policy setting, the default value of 500 is used for the maximum number of trusted documents that can be stored in the registry before the purge task runs.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted documents","registrySubPath":"maxtrusteddocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_SetMaximumNumberOfTrustRecordsToPreserve","uniqueId":4547,"displayName":"Set maximum number of trust records to preserve","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_SetMaximumNumberOfTrustRecordsToPreserve;L_SetMaximumNumberOfTrustRecordsToPreserveSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the maximum number of trust records to preserve when the purge task detects that this application has trusted more than the number of trusted documents set by the \"Set maximum number of trusted documents\" policy setting.\n\nIf you enable this policy setting, you may specify the maximum number of trust records to preserve, with an upper limit of 20000.  Due to performance reasons, it is not recommended to set it to the upper limit.\n\nIf you disable or you do not configure this policy setting, the default value for of 400 is used.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_SetMaximumNumberOfTrustRecordsToPreserve;L_SetMaximumNumberOfTrustRecordsToPreserveSpinID","uniqueId":4546,"displayName":"Maximum to preserve:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":20000},"dataType":"Integer"},"defaultValue":"400","description":"This policy setting allows you to specify the maximum number of trust records to preserve when the purge task detects that this application has trusted more than the number of trusted documents set by the \"Set maximum number of trusted documents\" policy setting.\n\nIf you enable this policy setting, you may specify the maximum number of trust records to preserve, with an upper limit of 20000.  Due to performance reasons, it is not recommended to set it to the upper limit.\n\nIf you disable or you do not configure this policy setting, the default value for of 400 is used.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted documents","registrySubPath":"maxpreservetrusteddocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_SetNumberOfPlacesInTheRecentPlacesList","uniqueId":4712,"displayName":"Number of folders in the Recent Folders list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_SetNumberOfPlacesInTheRecentPlacesList;L_SetNumberOfPlacesInTheRecentPlacesListSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the number of unpinned entries displayed in the Recent Folders list that appears when users click Open or Save As on the File tab in Backstage view.\n\nIf you enable this policy setting, you can specify the number of unpinned entries to be between 0 and 20. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 5 unpinned items are displayed in the Recent Folders list.\n\nNote: If you want to prevent items from being added to the Recent Folders list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["Display","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_SetNumberOfPlacesInTheRecentPlacesList;L_SetNumberOfPlacesInTheRecentPlacesListSpinID","uniqueId":4711,"displayName":"Number of folders: ","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":20},"dataType":"Integer"},"defaultValue":"5","description":"This policy setting specifies the number of unpinned entries displayed in the Recent Folders list that appears when users click Open or Save As on the File tab in Backstage view.\n\nIf you enable this policy setting, you can specify the number of unpinned entries to be between 0 and 20. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 5 unpinned items are displayed in the Recent Folders list.\n\nNote: If you want to prevent items from being added to the Recent Folders list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["Display","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\place mru","registrySubPath":"max display","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_Showfileopenwarnings","uniqueId":4527,"displayName":"Show file open warnings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Indicates whether a warning message is displayed when you open files that contain errors such as invalid XML code.","supportedPlatforms":["Windows"],"tags":["Save/Open","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"showxmlopenwarnings","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Showfilesavewarnings","uniqueId":4526,"displayName":"Show file save warnings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Indicates whether a warning message is displayed when you save files that contain errors such as invalid XML code.","supportedPlatforms":["Windows"],"tags":["Save/Open","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"showxmlsavewarnings","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_ShowMoreHandles","uniqueId":4521,"displayName":"Show more handles on hover","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"This policy setting allows you to show more shape handles when hovering over a selected shape.\n\nIf you enable this policy setting, more shape handles will be shown after a brief delay.\n\nIf you disable or do not configure this policy setting, more shape handles will not be shown.\n","supportedPlatforms":["Windows"],"tags":["Editing Options","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"handlebehavior","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Showshapesearchpane","uniqueId":4534,"displayName":"Show Shape Search pane","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Displays the shape search user interface elements of the stencil window.","supportedPlatforms":["Windows"],"tags":["Shape Search","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"showshapesearchpane","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_SmartTags","uniqueId":4498,"displayName":"Actions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Shows additional actions if you hover over them in the drawing.","supportedPlatforms":["Windows"],"tags":["Display","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"showsmarttags","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Smileyfacesandarrowswithspecialsymbols","uniqueId":4691,"displayName":"Smiley faces and arrows with special symbols","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["AutoCorrect Options","Proofing","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\autoformat as you type","registrySubPath":"smileys","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_SpecifyScreenTipsToAppear","uniqueId":4504,"displayName":"Specify ScreenTips to appear","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_SpecifyScreenTipsToAppear;L_SpecifyScreenTipsToAppearBoolID1","logicalOperator":"exists","values":null},{"dependee":"visio16;L_SpecifyScreenTipsToAppear;L_SpecifyScreenTipsToAppearBoolID2","logicalOperator":"exists","values":null},{"dependee":"visio16;L_SpecifyScreenTipsToAppear;L_SpecifyScreenTipsToAppearBoolID3","logicalOperator":"exists","values":null},{"dependee":"visio16;L_SpecifyScreenTipsToAppear;L_SpecifyScreenTipsToAppearBoolID4","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify what ScreenTips appear in Visio to help you identify and use various features, including drawing window rulers, control handles, and ShapeSheet cells.\n\nIf you enable this policy setting, you may specify one or more other ScreenTips that will appear for:\n- Drawing\n- Dialogs\n- Rulers\n- ShapeSheet\n\nIf you disable or do not configure this policy setting, no ScreenTips will appear for the options listed above.","supportedPlatforms":["Windows"],"tags":["Display","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_SpecifyScreenTipsToAppear;L_SpecifyScreenTipsToAppearBoolID1","uniqueId":4500,"displayName":"Drawing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to specify what ScreenTips appear in Visio to help you identify and use various features, including drawing window rulers, control handles, and ShapeSheet cells.\n\nIf you enable this policy setting, you may specify one or more other ScreenTips that will appear for:\n- Drawing\n- Dialogs\n- Rulers\n- ShapeSheet\n\nIf you disable or do not configure this policy setting, no ScreenTips will appear for the options listed above.","supportedPlatforms":["Windows"],"tags":["Display","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"tipsdrawing","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_SpecifyScreenTipsToAppear;L_SpecifyScreenTipsToAppearBoolID2","uniqueId":4501,"displayName":"Dialogs","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to specify what ScreenTips appear in Visio to help you identify and use various features, including drawing window rulers, control handles, and ShapeSheet cells.\n\nIf you enable this policy setting, you may specify one or more other ScreenTips that will appear for:\n- Drawing\n- Dialogs\n- Rulers\n- ShapeSheet\n\nIf you disable or do not configure this policy setting, no ScreenTips will appear for the options listed above.","supportedPlatforms":["Windows"],"tags":["Display","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"tipsdialogs","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_SpecifyScreenTipsToAppear;L_SpecifyScreenTipsToAppearBoolID3","uniqueId":4502,"displayName":"Rulers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to specify what ScreenTips appear in Visio to help you identify and use various features, including drawing window rulers, control handles, and ShapeSheet cells.\n\nIf you enable this policy setting, you may specify one or more other ScreenTips that will appear for:\n- Drawing\n- Dialogs\n- Rulers\n- ShapeSheet\n\nIf you disable or do not configure this policy setting, no ScreenTips will appear for the options listed above.","supportedPlatforms":["Windows"],"tags":["Display","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"tipsrulers","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_SpecifyScreenTipsToAppear;L_SpecifyScreenTipsToAppearBoolID4","uniqueId":4503,"displayName":"Shapesheet","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to specify what ScreenTips appear in Visio to help you identify and use various features, including drawing window rulers, control handles, and ShapeSheet cells.\n\nIf you enable this policy setting, you may specify one or more other ScreenTips that will appear for:\n- Drawing\n- Dialogs\n- Rulers\n- ShapeSheet\n\nIf you disable or do not configure this policy setting, no ScreenTips will appear for the options listed above.","supportedPlatforms":["Windows"],"tags":["Display","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"tipsshapesheet","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Startup","uniqueId":4682,"displayName":"Start-up","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_Startup;L_Startupcolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Displays the additional location for macros and add-ons opened when you start Visio.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_Startup;L_Startupcolon","uniqueId":4681,"displayName":"Start-up:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Displays the additional location for macros and add-ons opened when you start Visio.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"startuppath","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Stencils","uniqueId":4676,"displayName":"Stencils","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_Stencils;L_Stencilscolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Displays the additional location of stencils. When a location is added here, stencils in this location are listed on the Shapes submenu from the file menu.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_Stencils;L_Stencilscolon","uniqueId":4675,"displayName":"Stencils:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Displays the additional location of stencils. When a location is added here, stencils in this location are listed on the Shapes submenu from the file menu.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"stencilpath","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_StencilwindowScreenTips","uniqueId":4499,"displayName":"Stencil window ScreenTips","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Specifies whether ScreenTips (ScreenTips: Tips that appear when you pause the pointer over certain elements in the Visio program, including: masters on stencils, toolbar buttons, and the ruler) appear in Visio to help you identify shapes in the stencil window.","supportedPlatforms":["Windows"],"tags":["Display","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"tipsstencil","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Straightquoteswithsmartquotes","uniqueId":4687,"displayName":"Straight quotes with smart quotes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/Unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["AutoCorrect Options","Proofing","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\autoformat as you type","registrySubPath":"smartquotes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_Templates","uniqueId":4674,"displayName":"Templates","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_Templates;L_Templatescolon","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the additional location of templates.\n\nIf you enable this policy setting, you may specify the additional location of templates.  These locations are listed on the New screen of the File tab.\n\nIf you disable or do not configure this policy setting, no additional location of templates is shown.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_Templates;L_Templatescolon","uniqueId":4673,"displayName":"Templates:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify the additional location of templates.\n\nIf you enable this policy setting, you may specify the additional location of templates.  These locations are listed on the New screen of the File tab.\n\nIf you disable or do not configure this policy setting, no additional location of templates is shown.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"templatepath","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_Text","uniqueId":4506,"displayName":"Text","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_Text;L_text7","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the unit of measure for indents, line spacing and other text measurements. The default unit for type size is points (1 point = 1/72 in.). You can enter type size in another unit of measure (for example, 1ft or 12 in) but you can't change the default.","supportedPlatforms":["Windows"],"tags":["Display","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_Text;L_text7","uniqueId":4505,"displayName":"Text","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"51","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Picas","description":"","tags":[],"dependencyGroup":null},{"value":"50","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Points","description":"","tags":[],"dependencyGroup":null},{"value":"54","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Ciceros","description":"","tags":[],"dependencyGroup":null},{"value":"53","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Didots","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"51","description":"Specifies the unit of measure for indents, line spacing and other text measurements. The default unit for type size is points (1 point = 1/72 in.). You can enter type size in another unit of measure (for example, 1ft or 12 in) but you can't change the default.","supportedPlatforms":["Windows"],"tags":["Display","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\document","registrySubPath":"measurementsystem_text","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc01;L_Allowsubfolders","uniqueId":4560,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location1","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc01;L_Datecolon","uniqueId":4558,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location1","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc01;L_Descriptioncolon","uniqueId":4559,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location1","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc01;L_Pathcolon","uniqueId":4557,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location1","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc01","uniqueId":4561,"displayName":"Trusted Location #1","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_TrustedLoc01;L_Pathcolon","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc01;L_Datecolon","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc01;L_Descriptioncolon","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc01;L_Allowsubfolders","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_TrustedLoc02;L_allowsubfolders15","uniqueId":4565,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location2","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc02;L_datecolon13","uniqueId":4563,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location2","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc02;L_descriptioncolon14","uniqueId":4564,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location2","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc02;L_pathcolon12","uniqueId":4562,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location2","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc02","uniqueId":4566,"displayName":"Trusted Location #2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_TrustedLoc02;L_pathcolon12","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc02;L_datecolon13","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc02;L_descriptioncolon14","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc02;L_allowsubfolders15","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_TrustedLoc03;L_allowsubfolders19","uniqueId":4570,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location3","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc03;L_datecolon17","uniqueId":4568,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location3","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc03;L_descriptioncolon18","uniqueId":4569,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location3","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc03;L_pathcolon16","uniqueId":4567,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location3","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc03","uniqueId":4571,"displayName":"Trusted Location #3","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_TrustedLoc03;L_pathcolon16","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc03;L_datecolon17","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc03;L_descriptioncolon18","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc03;L_allowsubfolders19","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_TrustedLoc04;L_allowsubfolders23","uniqueId":4575,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location4","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc04;L_datecolon21","uniqueId":4573,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location4","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc04;L_descriptioncolon22","uniqueId":4574,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location4","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc04;L_pathcolon20","uniqueId":4572,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location4","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc04","uniqueId":4576,"displayName":"Trusted Location #4","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_TrustedLoc04;L_pathcolon20","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc04;L_datecolon21","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc04;L_descriptioncolon22","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc04;L_allowsubfolders23","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_TrustedLoc05;L_allowsubfolders27","uniqueId":4580,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location5","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc05;L_datecolon25","uniqueId":4578,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location5","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc05;L_descriptioncolon26","uniqueId":4579,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location5","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc05;L_pathcolon24","uniqueId":4577,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location5","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc05","uniqueId":4581,"displayName":"Trusted Location #5","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_TrustedLoc05;L_pathcolon24","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc05;L_datecolon25","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc05;L_descriptioncolon26","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc05;L_allowsubfolders27","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_TrustedLoc06;L_allowsubfolders31","uniqueId":4585,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location6","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc06;L_datecolon29","uniqueId":4583,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location6","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc06;L_descriptioncolon30","uniqueId":4584,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location6","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc06;L_pathcolon28","uniqueId":4582,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location6","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc06","uniqueId":4586,"displayName":"Trusted Location #6","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_TrustedLoc06;L_pathcolon28","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc06;L_datecolon29","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc06;L_descriptioncolon30","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc06;L_allowsubfolders31","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_TrustedLoc07;L_allowsubfolders35","uniqueId":4590,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location7","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc07;L_datecolon33","uniqueId":4588,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location7","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc07;L_descriptioncolon34","uniqueId":4589,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location7","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc07;L_pathcolon32","uniqueId":4587,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location7","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc07","uniqueId":4591,"displayName":"Trusted Location #7","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_TrustedLoc07;L_pathcolon32","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc07;L_datecolon33","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc07;L_descriptioncolon34","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc07;L_allowsubfolders35","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_TrustedLoc08;L_allowsubfolders39","uniqueId":4595,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location8","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc08;L_datecolon37","uniqueId":4593,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location8","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc08;L_descriptioncolon38","uniqueId":4594,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location8","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc08;L_pathcolon36","uniqueId":4592,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location8","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc08","uniqueId":4596,"displayName":"Trusted Location #8","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_TrustedLoc08;L_pathcolon36","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc08;L_datecolon37","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc08;L_descriptioncolon38","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc08;L_allowsubfolders39","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_TrustedLoc09;L_allowsubfolders43","uniqueId":4600,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location9","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc09;L_datecolon41","uniqueId":4598,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location9","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc09;L_descriptioncolon42","uniqueId":4599,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location9","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc09;L_pathcolon40","uniqueId":4597,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location9","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc09","uniqueId":4601,"displayName":"Trusted Location #9","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_TrustedLoc09;L_pathcolon40","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc09;L_datecolon41","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc09;L_descriptioncolon42","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc09;L_allowsubfolders43","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_TrustedLoc10;L_allowsubfolders47","uniqueId":4605,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location10","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc10;L_datecolon45","uniqueId":4603,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location10","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc10;L_descriptioncolon46","uniqueId":4604,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location10","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc10;L_pathcolon44","uniqueId":4602,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location10","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc10","uniqueId":4606,"displayName":"Trusted Location #10","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_TrustedLoc10;L_pathcolon44","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc10;L_datecolon45","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc10;L_descriptioncolon46","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc10;L_allowsubfolders47","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_TrustedLoc11;L_allowsubfolders51","uniqueId":4610,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location11","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc11;L_datecolon49","uniqueId":4608,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location11","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc11;L_descriptioncolon50","uniqueId":4609,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location11","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc11;L_pathcolon48","uniqueId":4607,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location11","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc11","uniqueId":4611,"displayName":"Trusted Location #11","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_TrustedLoc11;L_pathcolon48","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc11;L_datecolon49","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc11;L_descriptioncolon50","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc11;L_allowsubfolders51","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_TrustedLoc12;L_allowsubfolders55","uniqueId":4615,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location12","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc12;L_datecolon53","uniqueId":4613,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location12","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc12;L_descriptioncolon54","uniqueId":4614,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location12","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc12;L_pathcolon52","uniqueId":4612,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location12","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc12","uniqueId":4616,"displayName":"Trusted Location #12","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_TrustedLoc12;L_pathcolon52","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc12;L_datecolon53","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc12;L_descriptioncolon54","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc12;L_allowsubfolders55","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_TrustedLoc13;L_allowsubfolders59","uniqueId":4620,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location13","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc13;L_datecolon57","uniqueId":4618,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location13","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc13;L_descriptioncolon58","uniqueId":4619,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location13","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc13;L_pathcolon56","uniqueId":4617,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location13","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc13","uniqueId":4621,"displayName":"Trusted Location #13","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_TrustedLoc13;L_pathcolon56","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc13;L_datecolon57","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc13;L_descriptioncolon58","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc13;L_allowsubfolders59","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_TrustedLoc14;L_allowsubfolders63","uniqueId":4625,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location14","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc14;L_datecolon61","uniqueId":4623,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location14","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc14;L_descriptioncolon62","uniqueId":4624,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location14","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc14;L_pathcolon60","uniqueId":4622,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location14","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc14","uniqueId":4626,"displayName":"Trusted Location #14","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_TrustedLoc14;L_pathcolon60","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc14;L_datecolon61","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc14;L_descriptioncolon62","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc14;L_allowsubfolders63","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_TrustedLoc15;L_allowsubfolders67","uniqueId":4630,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location15","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc15;L_datecolon65","uniqueId":4628,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location15","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc15;L_descriptioncolon66","uniqueId":4629,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location15","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc15;L_pathcolon64","uniqueId":4627,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location15","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc15","uniqueId":4631,"displayName":"Trusted Location #15","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_TrustedLoc15;L_pathcolon64","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc15;L_datecolon65","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc15;L_descriptioncolon66","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc15;L_allowsubfolders67","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_TrustedLoc16;L_allowsubfolders71","uniqueId":4635,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location16","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc16;L_datecolon69","uniqueId":4633,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location16","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc16;L_descriptioncolon70","uniqueId":4634,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location16","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc16;L_pathcolon68","uniqueId":4632,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location16","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc16","uniqueId":4636,"displayName":"Trusted Location #16","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_TrustedLoc16;L_pathcolon68","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc16;L_datecolon69","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc16;L_descriptioncolon70","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc16;L_allowsubfolders71","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_TrustedLoc17;L_allowsubfolders75","uniqueId":4640,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location17","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc17;L_datecolon73","uniqueId":4638,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location17","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc17;L_descriptioncolon74","uniqueId":4639,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location17","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc17;L_pathcolon72","uniqueId":4637,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location17","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc17","uniqueId":4641,"displayName":"Trusted Location #17","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_TrustedLoc17;L_pathcolon72","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc17;L_datecolon73","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc17;L_descriptioncolon74","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc17;L_allowsubfolders75","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_TrustedLoc18;L_allowsubfolders79","uniqueId":4645,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location18","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc18;L_datecolon77","uniqueId":4643,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location18","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc18;L_descriptioncolon78","uniqueId":4644,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location18","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc18;L_pathcolon76","uniqueId":4642,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location18","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc18","uniqueId":4646,"displayName":"Trusted Location #18","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_TrustedLoc18;L_pathcolon76","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc18;L_datecolon77","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc18;L_descriptioncolon78","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc18;L_allowsubfolders79","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_TrustedLoc19;L_allowsubfolders83","uniqueId":4650,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location19","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc19;L_datecolon81","uniqueId":4648,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location19","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc19;L_descriptioncolon82","uniqueId":4649,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location19","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc19;L_pathcolon80","uniqueId":4647,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location19","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc19","uniqueId":4651,"displayName":"Trusted Location #19","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_TrustedLoc19;L_pathcolon80","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc19;L_datecolon81","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc19;L_descriptioncolon82","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc19;L_allowsubfolders83","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_TrustedLoc20;L_allowsubfolders87","uniqueId":4655,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location20","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc20;L_datecolon85","uniqueId":4653,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location20","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc20;L_descriptioncolon86","uniqueId":4654,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location20","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc20;L_pathcolon84","uniqueId":4652,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted locations\\location20","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TrustedLoc20","uniqueId":4656,"displayName":"Trusted Location #20","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_TrustedLoc20;L_pathcolon84","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc20;L_datecolon85","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc20;L_descriptioncolon86","logicalOperator":"exists","values":null},{"dependee":"visio16;L_TrustedLoc20;L_allowsubfolders87","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_TurnOffCADDWGFunctionality","uniqueId":4529,"displayName":"Turn off CAD/DWG functionality","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off all entry points related to CAD/DWG files.\n\nIf you enable this policy setting, CAD/DWG functionality will be turned off.\n\nIf you disable or do not configure this policy setting, CAD/DWG functionality will be turned on.","supportedPlatforms":["Windows"],"tags":["Save","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"disabledwg","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TurnOffLivePreview","uniqueId":4513,"displayName":"Turn off Live Preview","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"This policy setting allows you to configure Live Preview, which shows a preview of how a feature affects the document as you hover over different choices.\n\nIf you enable this policy setting, Live Preview is turned off.\n\nIf you disable or do not configure this policy setting, Live Preview is turned on.","supportedPlatforms":["Windows"],"tags":["User Interface Options","General","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"livepreview","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TurnOffLivePreviewInTheShapesWindow","uniqueId":4514,"displayName":"Turn off Live Preview in the Shapes window","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"This policy setting turns off the Live Preview in the Shapes window feature, which shows shapes in the Shapes window with the detail and color depth they will have in a drawing, including theme colors and effects.\n\nIf you enable this policy setting, Live Preview in the Shapes Window is turned off.\n\nIf you disable or do not configure this policy setting, Live Preview in the Shapes Window is turned on.","supportedPlatforms":["Windows"],"tags":["User Interface Options","General","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"livepreviewmasters","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TurnOffShapeSheetFormulaAutoComplete","uniqueId":4667,"displayName":"Turn off ShapeSheet Formula AutoComplete","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"This policy setting allows you to configure ShapeSheet Formula AutoComplete.\n\nIf you enable this policy setting, ShapeSheet Formula AutoComplete is turned off.\n\nIf you disable or do not configure this policy setting, ShapeSheet Formula AutoComplete is turned on.","supportedPlatforms":["Windows"],"tags":["Editing Options","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"formulaautocomplete","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TurnOffSmartDeleteBehaviorOfConnectorsWhenDeletingShapes","uniqueId":4666,"displayName":"Turn off smart delete behavior of connectors when deleting shapes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"This policy setting turns off smart delete behavior of connectors when deleting shapes.\n\nIf you enable this policy setting, connectors are not deleted when shapes are deleted.\n\nIf you disable or do not configure this policy setting, connectors are deleted when shapes are deleted.","supportedPlatforms":["Windows"],"tags":["Editing Options","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"deleteconnectorsenabled","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TurnOffTransitions","uniqueId":4665,"displayName":"Turn off transitions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"This policy setting allows you to configure transitions, which are smooth animation effects.\n\nIf you enable this policy setting, transitions are turned off.\n\nIf you disable or do not configure this policy setting, transitions are turned on.","supportedPlatforms":["Windows"],"tags":["Editing Options","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"transitionsenabled","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"visio16;L_TurnOffTrustedDocuments","uniqueId":4543,"displayName":"Turn off trusted documents","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off the trusted documents feature.  The trusted documents feature allows users to always enable active content in documents such as macros, ActiveX controls, data connections, etc. so that they are not prompted the next time they open the documents.  Trusted documents are exempt from security notifications.\n\nIf you enable this policy setting, you will turn off the trusted documents feature.  Users will receive a security prompt every time a document containing active content is opened.\n\nIf you disable or do not configure this policy setting, documents will be trusted when users enable content for a document, and users will not receive a security prompt.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted documents","registrySubPath":"disabletrusteddocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_TurnOffTrustedDocumentsOnTheNetwork","uniqueId":4542,"displayName":"Turn off Trusted Documents on the network","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off the trusted documents feature for documents opened from the network.\n\nIf you enable this policy setting, users will always see security notifications for active content such as macros, ActiveX controls, data connections, etc. for documents opened from the network.\n\nIf you disable or do not configure this policy setting, the trusted documents feature allows users to always allow active content in documents such as macros, ActiveX controls, data connections, etc. so that users are not prompted the next time they open the documents.  Trusted documents are exempt from security notifications.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\trusted documents","registrySubPath":"disablenetworktrusteddocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_VBAWarningsPolicy;L_Empty","uniqueId":4548,"displayName":"VBA Macro Notification Settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable all with notification","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable all except digitally signed macros","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable all without notification","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable all macros (not recommended)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":3,"recommendation":"security"}],"defaultValue":2,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n\nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security","registrySubPath":"vbawarnings","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_VBAWarningsPolicy;L_VBADigSigTrustedPublishersStr","uniqueId":4549,"displayName":"Require macros to be signed by a trusted publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n\nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security","registrySubPath":"vbadigsigtrustedpublishers","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_VBAWarningsPolicy;L_VBAOnlyAllowDigSigWithCodeSigningEKUStr","uniqueId":4551,"displayName":"Require Extended Key Usage (EKU) for certificates from trusted publishers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n\nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security","registrySubPath":"vbarequiredigsigwithcodesigningeku","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_VBAWarningsPolicy;L_VBAOnlyAllowLMTrustedPublisherStr","uniqueId":4550,"displayName":"Block certificates from trusted publishers that are only installed in the current user certificate store","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n\nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security","registrySubPath":"vbarequirelmtrustedpublisher","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_VBAWarningsPolicy","uniqueId":4552,"displayName":"VBA Macro Notification Settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_VBAWarningsPolicy;L_Empty","logicalOperator":"exists","values":null},{"dependee":"visio16;L_VBAWarningsPolicy;L_VBADigSigTrustedPublishersStr","logicalOperator":"exists","values":null},{"dependee":"visio16;L_VBAWarningsPolicy;L_VBAOnlyAllowLMTrustedPublisherStr","logicalOperator":"exists","values":null},{"dependee":"visio16;L_VBAWarningsPolicy;L_VBAOnlyAllowDigSigWithCodeSigningEKUStr","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n\nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_Visio2000Files","uniqueId":4660,"displayName":"Visio 2000-2002 Binary Drawings, Templates and Stencils","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_Visio2000Files;L_Visio2000FilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open or save Visio files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked: Both opening and saving of the file type will be blocked.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_Visio2000Files;L_Visio2000FilesDropID","uniqueId":4659,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":2,"description":"This policy setting allows you to determine whether users can open or save Visio files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked: Both opening and saving of the file type will be blocked.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\fileblock","registrySubPath":"visio2000files","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_Visio2003Files","uniqueId":4658,"displayName":"Visio 2003-2010 Binary Drawings, Templates and Stencils","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_Visio2003Files;L_Visio2003FilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open or save Visio files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked: Both opening and saving of the file type will be blocked.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_Visio2003Files;L_Visio2003FilesDropID","uniqueId":4657,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open or save Visio files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked: Both opening and saving of the file type will be blocked.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\fileblock","registrySubPath":"visio2003files","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_Visio50AndEarlierFiles","uniqueId":4662,"displayName":"Visio 5.0 or earlier Binary Drawings, Templates and Stencils","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"visio16;L_Visio50AndEarlierFiles;L_Visio50AndEarlierFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open or save Visio files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked: Both opening and saving of the file type will be blocked.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"visio16;L_Visio50AndEarlierFiles;L_Visio50AndEarlierFilesDropID","uniqueId":4661,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":2,"description":"This policy setting allows you to determine whether users can open or save Visio files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked: Both opening and saving of the file type will be blocked.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Visio Options","Microsoft Visio 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\security\\fileblock","registrySubPath":"visio50andearlierfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"visio16;L_ZoomonrollwithIntelliMouse","uniqueId":4515,"displayName":"Zoom on roll with IntelliMouse","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"If selected, lets you zoom in or out from a drawing by rolling the wheel of the Microsoft Intellimouse","supportedPlatforms":["Windows"],"tags":["Editing Options","Advanced","Visio Options","Microsoft Visio 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\visio\\application","registrySubPath":"zoomonroll","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"whiteboard;L_EnableAttributionsInWhiteboard","uniqueId":5390,"displayName":"View attributions in Whiteboard","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls whether users can view attributions on a whiteboard. Attributions show who was the first user and the latest user to write on a sticky note./r/nIf you enable or don't configure this policy, users on a whiteboard can view attributions. Even if enabled, the board owner of the whiteboard can disable attributions for that whiteboard from the Settings panel./r/nIf you disable this policy, users on the whiteboard can’t view attributions.","supportedPlatforms":["Windows","Web","Mac","iOS","Android"],"tags":["Whiteboard Options","Enable Attribution in Whiteboard","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\whiteboard\\options","registrySubPath":"EnableAttributionsInWhiteboard","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"whiteboard;L_InsertDocumentsInWhiteboard","uniqueId":5391,"displayName":"Allow documents to be inserted into Whiteboard sessions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether users can insert documents into Whiteboard sessions.\r\nIf you enable or do not configure this policy setting, the user will be able to insert documents into Whiteboard sessions.\r\nIf you disable this policy setting, the user will not be able to insert documents into Whiteboard sessions.\r\nFor more information, see https://go.microsoft.com/fwlink/?linkid=2189610","supportedPlatforms":["Windows","Web","Mac","iOS","Android"],"tags":["Whiteboard Options","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac","iOS","Android"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\whiteboard\\options","registrySubPath":"L_InsertDocumentsInWhiteboard","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Acronyms","uniqueId":5178,"displayName":"Remove the Acronyms command from the ribbon","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to remove the Acronyms command from the ribbon. The Acronyms command appears on the References tab.\n\nIf you enable this policy setting, the Acronyms command is removed from the ribbon. Users won't be able to add the Acronyms command to the ribbon manually. Therefore users won't be able to use the Acronyms feature.\n\nIf you disable or don't configure this policy setting, the Acronyms command appears on the ribbon.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n      ","supportedPlatforms":["Windows"],"tags":["General","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"acronyms","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_AddBiDirectionalMarkswhensavingTextfiles","uniqueId":4878,"displayName":"Add Bi-Directional Marks when saving Text files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checked: Add Bi-Directional Marks when saving Text files. | Unchecked: Do not add Bi-Directional Marks when saving Text files.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"addctrlcharssave","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_AddcontrolcharactersinCutandCopy","uniqueId":4836,"displayName":"Add control characters in Cut and Copy","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"addctrlcharscopy","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_AdddoublequoteforHebrewalphabetnumbering","uniqueId":4824,"displayName":"Add double quote for Hebrew alphabet numbering","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"hebdoublequote","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_AdjustformattingwhenpastingfromMicrosoftExcel","uniqueId":4903,"displayName":"Adjust formatting when pasting from Microsoft Excel","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Smart cut and paste","Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"formatexcelpaste","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Adjustparagraphspacingonpaste","uniqueId":4899,"displayName":"Adjust paragraph spacing on paste","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Smart cut and paste","Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"smartparapaste","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Adjustsentenceandwordspacingautomatically","uniqueId":4898,"displayName":"Adjust sentence and word spacing automatically","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Smart cut and paste","Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"smartsentencewordspacing","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Adjusttableformattingandalignmentonpaste","uniqueId":4900,"displayName":"Adjust table formatting and alignment on paste","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Smart cut and paste","Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"smarttablepaste","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_AdvancedTypographyOutlook","uniqueId":5188,"displayName":"Allow Advanced Typography features for Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting sets the “Advanced Typography” options found under Outlook’s File tab | Outlook Options | Mail | Editor Options | Advanced | Advanced Typography.\n\nIf you enable or do not configure this policy setting, Advanced Typography features will be applied. This is the default behavior.\n\nIf you disable this policy setting, Advanced Typography features will not be applied.\n      ","supportedPlatforms":["Windows"],"tags":["E-mail Options","Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\mailsettings","registrySubPath":"advancedtypographyall","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_AlertIfNotDefault","uniqueId":5158,"displayName":"Prompt the user if Word is not the default application for its file extensions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\n        This policy setting specifies whether to prompt users to change their file extensions association if any of the file type extensions that were associated with Word, are no longer associated with Word.\n\n        If you enable this policy setting, users will never be prompted on program start whenever any of these file types are associated with other applications. If the policy is Enabled, the checkbox under “File->Options-> General -> Start up options-> Tell me …” is Disabled and Unchecked.\n\n        If you disable or do not configure this policy setting users will be prompted on program start whenever any of these file types are associated with other applications. Users can change the behavior of the feature either by checking the checkbox presented in the prompt or by checking the checkbox under “File->Options-> General -> Start up options-> Tell me …”\n        If the policy is Not Configured or disabled the checkbox is Enabled and Checked by default.","supportedPlatforms":["Windows"],"tags":["General","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"alertifnotdefault","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_AllowA4Letterpaperresizing","uniqueId":4869,"displayName":"Scale content for A4 or 8.5'' x 11'' paper sizes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"mapstdsizes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_AllowaccenteduppercaseinFrench","uniqueId":4905,"displayName":"Allow accented uppercase in French","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the option ''Enforce accented uppercase in French''.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"accentonupper","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Allowbackgroundsaves","uniqueId":4872,"displayName":"Allow background saves","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"backgroundsave","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_AllowDDE","uniqueId":5172,"displayName":"Dynamic Data Exchange","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_AllowDDE;L_AllowDDEDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls the ability to use Dynamic Data Exchange (DDE) in Word. By default, DDE isn’t allowed in Word. Allowing DDE isn’t recommended because of security concerns.\n \nIf you enable this policy setting, you can select either of the following options:\n \n-Limit Dynamic Data Exchange\n-Allow Dynamic Data Exchange\n \nIf you choose “Limit Dynamic Data Exchange,” DDE requests made to an already running program are allowed.  But, DDE requests that require another executable program to be launched aren’t allowed.\n \nIf you disable or don’t configure this policy setting, DDE isn’t allowed.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_AllowDDE;L_AllowDDEDropID","uniqueId":5171,"displayName":"Dynamic Data Exchange","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Limited Dynamic Data Exchange","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow Dynamic Data Exchange","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":1,"description":"This policy setting controls the ability to use Dynamic Data Exchange (DDE) in Word. By default, DDE isn’t allowed in Word. Allowing DDE isn’t recommended because of security concerns.\n \nIf you enable this policy setting, you can select either of the following options:\n \n-Limit Dynamic Data Exchange\n-Allow Dynamic Data Exchange\n \nIf you choose “Limit Dynamic Data Exchange,” DDE requests made to an already running program are allowed.  But, DDE requests that require another executable program to be launched aren’t allowed.\n \nIf you disable or don’t configure this policy setting, DDE isn’t allowed.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security","registrySubPath":"allowdde","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_AllowSelectionFloaties","uniqueId":4739,"displayName":"Show Mini Toolbar on selection","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Disabling this policy setting will result in Mini Toolbar not being displayed on text selection. By default, Mini Toolbar on selection is enabled and its visibility can be changed via a setting in the Word Options dialog box.","supportedPlatforms":["Windows"],"tags":["General","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\toolbars\\word","registrySubPath":"allowselectionfloaties","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_AllowTrustedLocationsOnTheNetwork","uniqueId":4982,"displayName":"Allow Trusted Locations on the network","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting controls whether trusted locations on the network can be used.\n\nIf you enable this policy setting, users can specify trusted locations on network shares or in other remote locations that are not under their direct control by clicking the \"Add new location\" button in the Trusted Locations section of the Trust Center. Content, code, and add-ins are allowed to load from trusted locations with minimal security and without prompting the user for permission.\n\nIf you disable this policy setting, the selected application ignores any network locations listed in the Trusted Locations section of the Trust Center. \n\nIf you also deploy Trusted Locations via Group Policy, you should verify whether any of them are remote locations. If any of them are remote locations and you do not allow remote locations via this policy setting, those policy keys that point to remote locations will be ignored on client computers.\n\nDisabling this policy setting does not delete any network locations from the Trusted Locations list, but causes disruption for users who add network locations to the Trusted Locations list. Users are also prevented from adding new network locations to the Trusted Locations list in the Trust Center.  We recommended that you do not enable this policy setting (as the \"Allow Trusted Locations on my network (not recommended)\" check box also states). Therefore, in practice, it should be possible to disable this policy setting in most situations without causing significant usability issues for most users.\n\nIf you do not enable this policy setting, users can select the \"Allow Trusted Locations on my network (not recommended)\" check box if desired and then specify trusted locations by clicking the \"Add new location\" button.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations","registrySubPath":"allownetworklocations","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_AllowWordMailLoadEmbeddedFonts","uniqueId":5173,"displayName":"Allow embedded TrueType fonts to be sent in messages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"\n        This policy setting controls whether embedded TrueType fonts can be sent in messages.\n\n        By default, embedded TrueType fonts aren't allowed in messages. Allowing embedded TrueType fonts Isn't recommended because of security concerns.\n\n        If you enable this policy setting, embedded TrueType fonts can be sent in messages.\n\n        If you disable or don’t configure this policy setting, embedded TrueType fonts can't be sent in messages.\n      ","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security","registrySubPath":"wordmailloadembeddedfonts","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_AlternateClpLabelContentMarkAnchoringOption","uniqueId":5183,"displayName":"Use an alternate method of anchoring content marks from CLP labels","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting switches Word to use a alternate method of anchoring content marks associated with CLP labels, which can improve layout for some content marks.\n\nIf you enable this policy setting, Word will use the alternate content mark anchoring method.\n\nIf you disable or don't configure this policy setting, Word will use the original content mark anchoring method.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n      ","supportedPlatforms":["Windows"],"tags":["General","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"alternateclplabelcontentmarkanchoring","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Alternaterevisionbarpositioninprinteddocument","uniqueId":5149,"displayName":"Alternate revision bar position in printed document","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"Checked: For a multi-column page, revision bars are printed to the side of the column in which the revision appears. | Unchecked: For a multi-column page, revision bars are printed to the side of the page in which the revision appears.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"alternaterevbars","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_Alwayscreatebackupcopy","uniqueId":4870,"displayName":"Always create backup copy","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option found under File tab | Options | Advanced | Save.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"backupduringsave","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_AsianfontsalsoapplytoLatintext","uniqueId":4833,"displayName":"Asian fonts also apply to Latin text","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option. This option may be hidden in Word until certain editing languages are enabled.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"separateasianlatinfonts","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_AutoKeyboardswitching","uniqueId":4910,"displayName":"Auto-Keyboard switching","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"autokey","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_AutomaticallycreatedrawingcanvaswheninsertingAutoShapes","uniqueId":4822,"displayName":"Automatically create drawing canvas when inserting AutoShapes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"autocreatecanvas","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Automaticbulletedlists","uniqueId":4782,"displayName":"Automatic bulleted lists","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Apply as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"fbulletlist_296_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Automaticnumberedlists","uniqueId":4783,"displayName":"Automatic numbered lists","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Apply as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"fnumberedlist_312_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_AutoRecoverfiles","uniqueId":4888,"displayName":"AutoRecover files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_AutoRecoverfiles;L_autorecoverfiles13","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines the default path for storing AutoRecover files.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_AutoRecoverfiles;L_autorecoverfiles13","uniqueId":4887,"displayName":"AutoRecover files","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Defines the default path for storing AutoRecover files.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"autosave-path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_Autospace","uniqueId":4785,"displayName":"Auto space","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to set the option \"Delete needless spaces between Asian and Western text\" in the group \"Automatically as you type.\" This option may be hidden in Word until certain editing languages are enabled.\n\nIf you enable this policy setting, \"Delete needless spaces between Asian and Western text\" will be set.\n\nIf you disable or do not configure this policy setting, \"Delete needless spaces between Asian and Western text\" will not be set.","supportedPlatforms":["Windows"],"tags":["Automatically as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"fsbdbspace_152_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_BackgroundAccessibilityCheckerInformation","uniqueId":4735,"displayName":"Check for accessibility issues while editing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting controls whether accessibility issues are checked for automatically while the user is editing a document. By default, accessibility issues aren’t checked for automatically.\n\nIf you enable this policy setting, accessibility issues are checked for automatically and users won’t be able to turn it off. The status bar will indicate if accessibility recommendations are available to make the document more usable by people with disabilities.\n\nIf you disable or don’t configure this policy setting, accessibility issues won’t be checked for automatically while editing a document. Users can turn on automatic checking by going to File > Options > Ease of Access.\n","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"enableacccheckerstatusbaritem","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Backgroundprinting","uniqueId":4865,"displayName":"Print in background","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"backgroundprint","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Backofthesheet","uniqueId":4868,"displayName":"Print on back of the sheet for duplex printing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vprsu","registrySubPath":"fprorder2_22_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Balloons","uniqueId":4748,"displayName":"Balloons","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Balloons;L_Empty","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Turning balloons off will show revisions inline. This corresponds to the choices in the Review ribbon.","supportedPlatforms":["Windows"],"tags":["Track changes and compare","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Balloons;L_Empty","uniqueId":4747,"displayName":"Balloons","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Balloons on","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Comments and formatting only in balloons","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Balloons off (revisions inline)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":2,"description":"Turning balloons off will show revisions inline. This corresponds to the choices in the Review ribbon.","supportedPlatforms":["Windows"],"tags":["Track changes and compare","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"revmodeballoons","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_BlockAllUnmanagedAddins","uniqueId":5152,"displayName":"Block all unmanaged add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting blocks all add-ins that are not managed by the \"List of managed add-ins\" policy setting.\n\nIf you enable this policy setting, and the \"List of managed add-ins\" policy setting is also enabled, all add-ins are blocked except those that are configured as 1 (always enabled) or 2 (configurable by the user) in the \"List of managed add-ins\" policy setting.\n\nIf you disable or do not configure this policy setting, users can enable or disable any add-ins that are not managed by the \"List of managed add-ins\" policy setting.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\resiliency","registrySubPath":"restricttolist","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_BlockMacroExecutionFromInternet","uniqueId":4936,"displayName":"Block macros from running in Office files from the internet","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"\n        This policy setting allows you to block macros from running in Office files that come from the internet.\n\n        If you enable this policy setting, macros are blocked from running, even if \"Enable all macros\" is selected in the Macro Settings section of the Trust Center. Users will receive a notification that macros are blocked from running.\n\n        The exceptions when macros will be allowed to run are:\n        - The Office file is saved to a Trusted Location.\n        - The Office file was previously trusted by the user.\n        - Macros are digitally signed and the matching Trusted Publisher certificate is installed on the device.\n\n        If you disable this policy setting, the settings configured in the Macro Settings section of the Trust Center determine whether macros run in Office files that come from the internet.\n\n        If you don’t configure this policy setting, macros will be blocked from running. Users will receive a notification telling them of the security risks of macros from the internet along with a link to learn more.\n\n        For more information, see https://go.microsoft.com/fwlink/p/?linkid=2185771.\n      ","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security","registrySubPath":"blockcontentexecutionfrominternet","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Boldand_italic_withrealformatting","uniqueId":4776,"displayName":"*Bold* and _italic_ with real formatting","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to set the \"*Bold* and _italic_ with real formatting\" option.\n\nIf you enable this policy setting, you will set the the \"*Bold* and _italic_ with real formatting\" option in File | Options | Proofing | AutoCorrect Options... | AutoFormat.\n\nIf you disable or do not configure this policy setting, the option is not set.","supportedPlatforms":["Windows"],"tags":["Replace as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"fbolditalic_120_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Bookmarks","uniqueId":4842,"displayName":"Show bookmarks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"showbookmarks","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_BorderLines","uniqueId":4779,"displayName":"Border lines","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the option \"Border Lines.\"","supportedPlatforms":["Windows"],"tags":["Apply as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"fbotbord_328_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Capitalizefirstletterofsentence","uniqueId":4766,"displayName":"Capitalize first letter of sentence","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["AutoCorrect","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"finitialcap_32_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Capitalizenamesofdays","uniqueId":4767,"displayName":"Capitalize names of days","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["AutoCorrect","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"fcapdaynames_48_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_ChartRefTrackingEnabled","uniqueId":5157,"displayName":"Allow formatting and labels to track data points","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting governs how custom formatting and data labels react to data changes in a chart.\n\nIf you enable or do not configure this policy setting, when the user creates a new presentation, custom formatting and data labels follow data points as they move or change in any chart in the workbook.\n\nIf you disable this policy setting, custom formatting and data labels do not follow data points, but instead follow data point indices.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"charttrackingrefbased","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Checkgrammarasyoutype","uniqueId":4756,"displayName":"Mark grammar errors as you type","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Checkgrammarasyoutype;L_checktoenforcesettingonunchecktoenforcesettingoff0","logicalOperator":"exists","values":null},{"dependee":"word16;L_Checkgrammarasyoutype;L_Colorformarkinggrammaticalerrors","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines color to use for marking grammatical errors.","supportedPlatforms":["Windows"],"tags":["Proofing","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Checkgrammarasyoutype;L_checktoenforcesettingonunchecktoenforcesettingoff0","uniqueId":4754,"displayName":"Check to enforce setting on; uncheck to enforce setting off","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Defines color to use for marking grammatical errors.","supportedPlatforms":["Windows"],"tags":["Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"autogrammar","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Checkgrammarasyoutype;L_Colorformarkinggrammaticalerrors","uniqueId":4755,"displayName":"Color for marking grammatical errors","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Black","description":"","tags":[],"dependencyGroup":null},{"value":255,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Blue","description":"","tags":[],"dependencyGroup":null},{"value":128,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Blue","description":"","tags":[],"dependencyGroup":null},{"value":3368703,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light Blue","description":"","tags":[],"dependencyGroup":null},{"value":52479,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sky Blue","description":"","tags":[],"dependencyGroup":null},{"value":10079487,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Pale Blue","description":"","tags":[],"dependencyGroup":null},{"value":6710937,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Blue Gray","description":"","tags":[],"dependencyGroup":null},{"value":65280,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Green","description":"","tags":[],"dependencyGroup":null},{"value":32768,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Green","description":"","tags":[],"dependencyGroup":null},{"value":13056,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Darker Green","description":"","tags":[],"dependencyGroup":null},{"value":13434828,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light Green","description":"","tags":[],"dependencyGroup":null},{"value":3355392,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Olive Green","description":"","tags":[],"dependencyGroup":null},{"value":3381606,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sea Green","description":"","tags":[],"dependencyGroup":null},{"value":16711680,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Red","description":"","tags":[],"dependencyGroup":null},{"value":8388608,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Red","description":"","tags":[],"dependencyGroup":null},{"value":16776960,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yellow","description":"","tags":[],"dependencyGroup":null},{"value":8421376,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Yellow","description":"","tags":[],"dependencyGroup":null},{"value":16777113,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light Yellow","description":"","tags":[],"dependencyGroup":null},{"value":16777215,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"White","description":"","tags":[],"dependencyGroup":null},{"value":10040064,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Brown","description":"","tags":[],"dependencyGroup":null},{"value":16737792,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Orange","description":"","tags":[],"dependencyGroup":null},{"value":16750848,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light Orange","description":"","tags":[],"dependencyGroup":null},{"value":65535,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cyan","description":"","tags":[],"dependencyGroup":null},{"value":32896,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Cyan","description":"","tags":[],"dependencyGroup":null},{"value":13434879,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light Cyan","description":"","tags":[],"dependencyGroup":null},{"value":16711935,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Magenta","description":"","tags":[],"dependencyGroup":null},{"value":8388736,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Magenta","description":"","tags":[],"dependencyGroup":null},{"value":13158,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Teal","description":"","tags":[],"dependencyGroup":null},{"value":3355545,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Indigo","description":"","tags":[],"dependencyGroup":null},{"value":10079232,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Lime","description":"","tags":[],"dependencyGroup":null},{"value":3394764,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Aqua","description":"","tags":[],"dependencyGroup":null},{"value":16763904,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gold","description":"","tags":[],"dependencyGroup":null},{"value":10040166,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Plum","description":"","tags":[],"dependencyGroup":null},{"value":16751052,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Rose","description":"","tags":[],"dependencyGroup":null},{"value":16764057,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tan","description":"","tags":[],"dependencyGroup":null},{"value":13408767,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Lavender","description":"","tags":[],"dependencyGroup":null},{"value":8421504,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gray","description":"","tags":[],"dependencyGroup":null},{"value":12632256,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gray 25%","description":"","tags":[],"dependencyGroup":null},{"value":8421504,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gray 50%","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Defines color to use for marking grammatical errors.","supportedPlatforms":["Windows"],"tags":["Proofing","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"grammarwavyunderlinecolor","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Checkgrammarwithspelling","uniqueId":4757,"displayName":"Check grammar with spelling","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"rungrammar","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_CheckifWordisthedefaulteditorforallotherWebpages","uniqueId":4880,"displayName":"Check if Word is the default editor for all other Web pages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Files","Web Options...","Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"donotcheckifwordisdefaulthtmleditor","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Clipartpictures","uniqueId":4886,"displayName":"Clipart pictures","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Clipartpictures;L_clipartpictures12","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to define the default path to Clipart pictures that is set in Word Options | Advanced | General | \"File Locations...\"\n\nIf you enable this policy setting, you may specify the default path to Clipart pictures.\n\nIf you disable or do not configure this policy setting, no path is specified.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Clipartpictures;L_clipartpictures12","uniqueId":4885,"displayName":"Clipart pictures","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to define the default path to Clipart pictures that is set in Word Options | Advanced | General | \"File Locations...\"\n\nIf you enable this policy setting, you may specify the default path to Clipart pictures.\n\nIf you disable or do not configure this policy setting, no path is specified.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"picture-path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_ClosingStyleToLetterClosings","uniqueId":4784,"displayName":"Closing style to letter closings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to set the \"Closing style to letter closings\" option found in Word Options | Proofing | AutoCorrect Options... | AutoFormat As You Type.\n\nIf you enable this policy setting, \"Closing style to letter closings\" will be set.\n\nIf you disable or do not configure this policy setting, \"Closing style to letter closings\" will not be set.","supportedPlatforms":["Windows"],"tags":["Apply as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"fclosing_360_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Compareresultingdocument","uniqueId":4746,"displayName":"Compare resulting document","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Compareresultingdocument;L_CompareresultingdocumentPart","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This option determines whether the results of a document compare or combine will appear in a new document or one of the source documents. This corresponds to the option in the Compare dialog box ( Review ribbon | Compare | more options).","supportedPlatforms":["Windows"],"tags":["Track changes and compare","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Compareresultingdocument;L_CompareresultingdocumentPart","uniqueId":4745,"displayName":"Document used for result of compare:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Original Document","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Revised Document","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"New document","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This option determines whether the results of a document compare or combine will appear in a new document or one of the source documents. This corresponds to the option in the Compare dialog box ( Review ribbon | Compare | more options).","supportedPlatforms":["Windows"],"tags":["Track changes and compare","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"comparedestdoc","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_CompatModeOnSaveAs","uniqueId":4808,"displayName":"Save As Open XML in Compatibility Mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to hide the \"Maintain compatibility with previous versions of Word\" checkbox.  For any file format that is in Compatibility Mode, there will be a \"Maintain compatibility with previous versions of Word\" checkbox in the Save As dialog when saving to any of the Open XML file formats. This checkbox allows users to preserve the fidelity of documents that open in compatibility mode when saving those documents to any of the Open XML file formats.  Checking this box will prevent conversion to the version of Word that is saving the file.\n\nConversion maximizes fidelity with the version of Word that is saving the file, and it is recommended for users who want their Word documents to be compatible with this version of Word. However, conversion may impact the fidelity and compatibility of some features when the file is opened by a previous version of Word.\n\nIf you enable this policy setting, the \"Maintain compatibility with previous versions of Word\" checkbox will be hidden.  The Save As behavior for any of the Open XML file formats will always maintain compatibility with previous versions of Word. The file that is in compatibility mode will be prevented from being converted to the version of Word saving this file. \n\nIf you disable or do not configure this policy setting, the \"Maintain compatibility with previous versions of Word\" checkbox in the Save As dialog will be shown.  Unless checked by the user, an Open XML file will be converted when the document is saved. Users will still, by default, be shown a final dialog when saving to confirm that the user wants to save the file without \"Maintain compatibility with previous versions of Word\" checked.","supportedPlatforms":["Windows"],"tags":["Save","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"disablecompatmodecheckboxonsaveas","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_ConfigureCNGCipherChainingMode","uniqueId":4914,"displayName":"Configure CNG cipher chaining mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_ConfigureCNGCipherChainingMode;L_ConfigureCNGCipherChainingModeDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the cipher chaining mode used.\n\nIf you enable this policy setting, the cipher chaining mode specified will be applied.\n\nIf you disable or do not configure this policy setting, Cipher Block Chaining (CBC) will be the default CNG cipher chaining mode used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_ConfigureCNGCipherChainingMode;L_ConfigureCNGCipherChainingModeDropID","uniqueId":4913,"displayName":"Configure CNG cipher chaining mode","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"ChainingModeCBC","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cipher Block Chaining (CBC)","description":"","tags":[],"dependencyGroup":null},{"value":"ChainingModeCFB","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cipher Feedback (CFB)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"ChainingModeCBC","description":"This policy setting allows you to configure the cipher chaining mode used.\n\nIf you enable this policy setting, the cipher chaining mode specified will be applied.\n\nIf you disable or do not configure this policy setting, Cipher Block Chaining (CBC) will be the default CNG cipher chaining mode used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\crypto","registrySubPath":"cipherchaining","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_ConfirmconversionatOpen","uniqueId":4874,"displayName":"Confirm file format conversion on open","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to set the \"Confirm file format conversion on open\" option in Word Options | Advanced | General.\n\nIf you enable this policy setting, \"Confirm file format conversion on open\" will be set.\n\nIf you disable or do not configure this policy setting, \"Confirm file format conversion on open\" will not be set.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"confirmfileconversion","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Controlcharacters","uniqueId":4841,"displayName":"Show control characters","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"showctrlchars","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_ConvertCommonTerms","uniqueId":5118,"displayName":"Convert common terms","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option in the \"Chinese Conversion\" dialog, which found under Review tab | Convert with Options button. This may only be visible when Chinese is enabled as an editing language.","supportedPlatforms":["Windows"],"tags":["Chinese Conversion | Convert with Options","Review Tab","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\shared tools\\proofing tools\\tcsc translator","registrySubPath":"translatecommonterms","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_CopyRemotelyStoredFiles","uniqueId":4871,"displayName":"Copy remotely stored files onto your computer, and update the remote file when saving","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to set the \"Copy remotely stored files onto your computer, and update the remote file when saving\" option in Word Options | Advanced | Save.\n\nIf you enable this policy setting, \"Copy remotely stored files onto your computer, and update the remote file when saving\" will be set.\n\nIf you disable or do not configure this policy setting, \"Copy remotely stored files onto your computer, and update the remote file when saving\" will not be set.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"makelocalcopy","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_CorrectaccidentalusageofcAPSLOCKkey","uniqueId":4768,"displayName":"Correct accidental usage of cAPS LOCK key","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to set the \"Correct accidental usage of cAPS LOCK key\" option in Word Options | Proofing | \"AutoCorrect Options...\" | AutoCorrect.\n\nIf you enable this policy setting, \"Correct accidental usage of cAPS LOCK key\" will be set.\n\nIf you disable or do not configure this policy setting, \"Correct accidental usage of cAPS LOCK key\" will not be set.y","supportedPlatforms":["Windows"],"tags":["AutoCorrect","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"fcapslock_40_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Correctkeyboardsetting","uniqueId":4770,"displayName":"Correct keyboard setting","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to set the \"Correct keyboard setting\" option in Word Options | Proofing | \"AutoCorrect Options...\" | AutoCorrect.\n\nIf you enable this policy setting, \"Correct keyboard setting\" will be set.\n\nIf you disable or do not configure this policy setting, \"Correct keyboard setting\" will not be set.","supportedPlatforms":["Windows"],"tags":["AutoCorrect","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"fcorrectkeyboard_64_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_CorrectTWoINitialCApitals","uniqueId":4765,"displayName":"Correct TWo INitial CApitals","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["AutoCorrect","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"ftwoinitialcaps_24_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_CustomMarkupWarning","uniqueId":5156,"displayName":"Custom markup warning","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_CustomMarkupWarning;L_CustomMarkupWarningDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies how Word behaves when opening a document that contains custom XML markup.\n\nIf you enable this policy setting, you can set the behavior to one of the following: \n\n- 0: Do not prompt the user and silently remove the custom XML markup. \n\n- 1: Prompt the user regarding the loss of custom XML markup. This is the default option. \n\n- 2: Prompt the user regarding the loss of custom XML markup, and do not allow them to suppress this prompt. \n\n- 3: Prompt the user regarding the loss of custom XML markup, and open the file read-only. \n\n- 4: Prompt the user regarding the loss of custom XML markup, do not allow them to suppress this prompt, and open the file read-only. \n\n- 5: Do not prompt the user and silently remove the custom XML markup, but open the file read-only.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_CustomMarkupWarning;L_CustomMarkupWarningDropID","uniqueId":5155,"displayName":"Custom markup warning:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not prompt","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Always prompt","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Prompt and open the file read-only","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Always prompt and open the file read-only","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not prompt and open the file read-only","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This policy setting specifies how Word behaves when opening a document that contains custom XML markup.\n\nIf you enable this policy setting, you can set the behavior to one of the following: \n\n- 0: Do not prompt the user and silently remove the custom XML markup. \n\n- 1: Prompt the user regarding the loss of custom XML markup. This is the default option. \n\n- 2: Prompt the user regarding the loss of custom XML markup, and do not allow them to suppress this prompt. \n\n- 3: Prompt the user regarding the loss of custom XML markup, and open the file read-only. \n\n- 4: Prompt the user regarding the loss of custom XML markup, do not allow them to suppress this prompt, and open the file read-only. \n\n- 5: Do not prompt the user and silently remove the custom XML markup, but open the file read-only.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"custommarkupwarning","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Dashlikecharacters","uniqueId":4777,"displayName":"Dash-like characters","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the option \"Long vowel sounds with dash.\" This option may be hidden in Word until certain editing languages are enabled.","supportedPlatforms":["Windows"],"tags":["Replace as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"fdbdashes_136_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DateStyle","uniqueId":4781,"displayName":"Date style","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the option \"Date style.\"  This option may be hidden in Word until certain editing languages are enabled.","supportedPlatforms":["Windows"],"tags":["Apply as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"fdate_376_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DefaultCompressionQualityForInlinedImagesInOutlook","uniqueId":5181,"displayName":"Specify default quality of compression done on inlined images inserted in Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_DefaultCompressionQualityForInlinedImagesInOutlook;L_DefaultCompressionQualityForInlinedImagesInOutlookPart","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify default quality of compression done on inlined images in Outlook.\n\nIf you enable this policy setting, Outlook would compress the inlined images in the message as per the specified quality.\n\nIf you disable or don't configure this policy setting, inlined images would be compressed at the default quality (220 dpi).\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n    ","supportedPlatforms":["Windows"],"tags":["E-mail Options","Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_DefaultCompressionQualityForInlinedImagesInOutlook;L_DefaultCompressionQualityForInlinedImagesInOutlookPart","uniqueId":5180,"displayName":"Default inline image compression quality for Outlook:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"High Fidelity","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"330 ppi","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"220 ppi","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"150 ppi","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"96 ppi","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify default quality of compression done on inlined images in Outlook.\n\nIf you enable this policy setting, Outlook would compress the inlined images in the message as per the specified quality.\n\nIf you disable or don't configure this policy setting, inlined images would be compressed at the default quality (220 dpi).\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n    ","supportedPlatforms":["Windows"],"tags":["E-mail Options","Advanced","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\mailsettings","registrySubPath":"oulookimagedpiindex","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DefaultCustomTab","uniqueId":5162,"displayName":"Show custom templates tab by default in Word on the Office Start screen and in File | New","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether custom templates (when they exist) show as the default tab in Word on the Office Start screen and in File | New. \n\nIf you enable this policy setting, users will the see custom templates tab as the default tab in Word on the Office Start screen and in File | New when templates exist (this can include Custom XML programmed templates, templates in the Workgroup templates path, templates in the Personal templates path, or SharePoint templates).\n\nIf you disable or do not configure this policy setting, users will see the Featured templates tab as the default tab in Word on the Office Start screen and in File | New, unless all Office-provided templates have been disabled.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"officestartdefaulttab","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DefaultFileLocation","uniqueId":4884,"displayName":"Default File Location","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_DefaultFileLocation;L_Documents","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines the default path to documents.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_DefaultFileLocation;L_Documents","uniqueId":4883,"displayName":"Documents","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"Defines the default path to documents.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Word Options","Microsoft Word 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"doc-path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_Definestylesbasedonyourformatting","uniqueId":4789,"displayName":"Define styles based on your formatting","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Automatically as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"fautostyledef_184_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Delaybeforestartingbackgroundspellingchecker","uniqueId":4762,"displayName":"Delay before starting background spelling checker","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Delaybeforestartingbackgroundspellingchecker;L_Delaybeforestartingbackgroundspellingchecker3","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure when the background spell check is started.\n\nIf you enable this policy setting, you may specify the delay, in milliseconds, before the background spell check is started. This setting only applies when Word is running in a terminal server session.\n\nIf you disable or do not configure this policy setting, Word will behave normally when in a terminal server session.","supportedPlatforms":["Windows"],"tags":["Proofing","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Delaybeforestartingbackgroundspellingchecker;L_Delaybeforestartingbackgroundspellingchecker3","uniqueId":4761,"displayName":"Milliseconds (e.g. 5000 milliseconds = 5 seconds)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":2147483647},"dataType":"Integer"},"defaultValue":"0","description":"This policy setting allows you to configure when the background spell check is started.\n\nIf you enable this policy setting, you may specify the delay, in milliseconds, before the background spell check is started. This setting only applies when Word is running in a terminal server session.\n\nIf you disable or do not configure this policy setting, Word will behave normally when in a terminal server session.","supportedPlatforms":["Windows"],"tags":["Proofing","Word Options","Microsoft Word 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"terminalserverspellingstart","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Delaybeforestartingotherproofingtools;L_Delaybeforestartingbackgroundgrammarchecker3","uniqueId":4763,"displayName":"Milliseconds (e.g. 5000 milliseconds = 5 seconds)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":2147483647},"dataType":"Integer"},"defaultValue":"5000","description":"This policy setting allows you to configure when the background grammar check is started.\n\nIf you enable this policy setting, you may specify the delay, in milliseconds, before the background grammar check is started. This setting only applies when Word is running in a terminal server session.\n\nIf you disable or do not configure this policy setting, Word will behave normally when in a terminal server session.","supportedPlatforms":["Windows"],"tags":["Proofing","Word Options","Microsoft Word 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"terminalserverotherproofstart","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Delaybeforestartingotherproofingtools","uniqueId":4764,"displayName":"Delay before starting other proofing tools","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Delaybeforestartingotherproofingtools;L_Delaybeforestartingbackgroundgrammarchecker3","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure when the background grammar check is started.\n\nIf you enable this policy setting, you may specify the delay, in milliseconds, before the background grammar check is started. This setting only applies when Word is running in a terminal server session.\n\nIf you disable or do not configure this policy setting, Word will behave normally when in a terminal server session.","supportedPlatforms":["Windows"],"tags":["Proofing","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Deletionscolor","uniqueId":4741,"displayName":"Deletions color","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Deletionscolor;L_DeletionscolorPart","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Selects the color for tracked deletions. This corresponds to the choices in the Review ribbon | Track changes | Change tracking options dialog box.","supportedPlatforms":["Windows"],"tags":["Track changes and compare","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Deletionscolor;L_DeletionscolorPart","uniqueId":4740,"displayName":"Color for tracking deletions:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"By Author","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"None","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Black","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Blue","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Turquoise","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bright Green","description":"","tags":[],"dependencyGroup":null},{"value":6,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Pink","description":"","tags":[],"dependencyGroup":null},{"value":7,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Red","description":"","tags":[],"dependencyGroup":null},{"value":8,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yellow","description":"","tags":[],"dependencyGroup":null},{"value":9,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"White","description":"","tags":[],"dependencyGroup":null},{"value":10,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Blue","description":"","tags":[],"dependencyGroup":null},{"value":11,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Teal","description":"","tags":[],"dependencyGroup":null},{"value":12,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Green","description":"","tags":[],"dependencyGroup":null},{"value":13,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Violet","description":"","tags":[],"dependencyGroup":null},{"value":14,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Red","description":"","tags":[],"dependencyGroup":null},{"value":15,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Yellow","description":"","tags":[],"dependencyGroup":null},{"value":16,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gray 50%","description":"","tags":[],"dependencyGroup":null},{"value":17,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gray 25%","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Selects the color for tracked deletions. This corresponds to the choices in the Review ribbon | Track changes | Change tracking options dialog box.","supportedPlatforms":["Windows"],"tags":["Track changes and compare","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"revmodedelcolor","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Detectlanguageautomatically","uniqueId":5114,"displayName":"Detect language automatically","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Language | Set Proofing Language...","Review Tab","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"langautodetect","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DeterminewhethertoforceencryptedWord","uniqueId":4943,"displayName":"Scan encrypted macros in Word Open XML documents","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_DeterminewhethertoforceencryptedWord;L_DeterminewhethertoforceencryptedWordDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls whether encrypted macros in Open XML documents be are required to be scanned with anti-virus software before being opened.\n\nIf you enable this policy setting, you may choose one of these options:\n\n- Scan encrypted macros: encrypted macros are disabled unless anti-virus software is installed.  Encrypted macros are scanned by your anti-virus software when you attempt to open an encrypted workbook that contains macros.\n- Scan if anti-virus software available: if anti-virus software is installed, scan the encrypted macros first before allowing them to load.  If anti-virus software is not available, allow encrypted macros to load.\n- Load macros without scanning: do not check for anti-virus software and allow macros to be loaded in an encrypted file.\n\nIf you disable or do not configure this policy setting, the behavior will be similar to the \"Scan encrypted macros\" option.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_DeterminewhethertoforceencryptedWord;L_DeterminewhethertoforceencryptedWordDropID","uniqueId":4942,"displayName":"Scan encrypted macros in Word Open XML documents","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Scan encrypted macros (default)","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Scan if anti-virus software available","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Load macros without scanning","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls whether encrypted macros in Open XML documents be are required to be scanned with anti-virus software before being opened.\n\nIf you enable this policy setting, you may choose one of these options:\n\n- Scan encrypted macros: encrypted macros are disabled unless anti-virus software is installed.  Encrypted macros are scanned by your anti-virus software when you attempt to open an encrypted workbook that contains macros.\n- Scan if anti-virus software available: if anti-virus software is installed, scan the encrypted macros first before allowing them to load.  If anti-virus software is not available, allow encrypted macros to load.\n- Load macros without scanning: do not check for anti-virus software and allow macros to be loaded in an encrypted file.\n\nIf you disable or do not configure this policy setting, the behavior will be similar to the \"Scan encrypted macros\" option.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security","registrySubPath":"wordbypassencryptedmacroscan","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Diacritics","uniqueId":4847,"displayName":"Diacritics","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"showdiac","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Differentcolorfordiacritics","uniqueId":4848,"displayName":"Use this color for diacritics","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"usecolordiac","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DigitalPrint","uniqueId":5174,"displayName":"Don't show the option to transform a document to a Sway web page","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the File menu option to transform a Word document to a Sway web page is shown to the user. By default, this option is shown to the user.\n\nIf you enable this policy setting, the File menu option to transform a Word document to a Sway web page is hidden from the user. \n\nIf you disable or don't configure this policy setting, the File menu option to transform a Word document to a Sway web page is shown to the user.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n      ","supportedPlatforms":["Windows"],"tags":["General","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"transformtosway","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Disableallapplicationextensions","uniqueId":4945,"displayName":"Disable all application add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting disables all add-ins for the specified Office 2016 applications.\n      \nIf you enable this policy setting, all add-ins for the specified Office 2016 applications are disabled.\n\nIf you disable or do not configure this policy setting, all add-ins for the specified Office 2016 applications are allowed to run without notifying the users, except if application add-ins are required to be signed by Trusted Publishers.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security","registrySubPath":"disablealladdins","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DisableCoauthoringOnDocmFiles","uniqueId":5176,"displayName":"Prevent co-authoring on files with macros for Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls whether users will be able to co-author Word documents with macros.\n\nEnabling this policy setting will turn off the ability to co-author Word documents with macros.\n\nIf you disable or don't configure this policy setting, the user will be able to co-author Word documents with macros.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n      ","supportedPlatforms":["Windows"],"tags":["Co-authoring","Collaboration Settings","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\coauthoring","registrySubPath":"disablecoauthondocmfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_disablecommandbarbuttonsandmenuitems174","uniqueId":5139,"displayName":"Disable commands","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_disablecommandbarbuttonsandmenuitems174;L_EnteracommandbarIDtodisable","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable any command bar button and menu item with a command bar ID, including command bar buttons and menu items that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, all default command bar buttons or menu items are available to users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_disablecommandbarbuttonsandmenuitems174;L_EnteracommandbarIDtodisable","uniqueId":5138,"displayName":"Enter a command bar ID to disable","settingType":{"possibleValues":{"possibleValuesType":"List","ValueType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to disable any command bar button and menu item with a command bar ID, including command bar buttons and menu items that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item.  The ID number needs to be in decimal (not hexadecimal).  Multiple values should be separated by commas.\n\nIf you disable or do not configure this policy setting, all default command bar buttons or menu items are available to users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\disabledcmdbaritemslist","registryPath":"TCID","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_Disablecommandbarbuttonsandmenuitems","uniqueId":5132,"displayName":"Disable predefined commands","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Disablecommandbarbuttonsandmenuitems;L_FileWebPagePreview","logicalOperator":"exists","values":null},{"dependee":"word16;L_Disablecommandbarbuttonsandmenuitems;L_FileSendToMailRecipient","logicalOperator":"exists","values":null},{"dependee":"word16;L_Disablecommandbarbuttonsandmenuitems;L_InsertHyperlinkWd","logicalOperator":"exists","values":null},{"dependee":"word16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsProtectDocument","logicalOperator":"exists","values":null},{"dependee":"word16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroWd","logicalOperator":"exists","values":null},{"dependee":"word16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroMacrosWd","logicalOperator":"exists","values":null},{"dependee":"word16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroRecordNewMacro","logicalOperator":"exists","values":null},{"dependee":"word16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroSecurity","logicalOperator":"exists","values":null},{"dependee":"word16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroVisualBasicEditorWd","logicalOperator":"exists","values":null},{"dependee":"word16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsTemplatesandAddIns","logicalOperator":"exists","values":null},{"dependee":"word16;L_Disablecommandbarbuttonsandmenuitems;L_WebAddressWd","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable some specific commands in Microsoft Word. Commands are buttons, menus, or other items that can be added to the Quick Access Toolbar or to the Ribbon under File tab | Options | Quick Access Toolbar or via File | Options | Customize Ribbon, respectively.\n\nIf you enable this policy setting then you can specify what commands in the user interface for Word are disabled.\n\nIf you disable or do not configure this policy setting, the  commands in the predefined list are all enabled in Word.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\disabledcmdbaritemscheckboxes","registrySubPath":"weboptions","enforcedValues":{}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\disabledcmdbaritemscheckboxes","registrySubPath":"generaloptions","enforcedValues":{}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\disabledcmdbaritemscheckboxes","registrySubPath":"fileopensearchtheweb","enforcedValues":{}}]}}},{"id":"word16;L_Disablecommandbarbuttonsandmenuitems;L_FileSendToMailRecipient","uniqueId":5122,"displayName":"File tab | Share | Email","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"2188","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable some specific commands in Microsoft Word. Commands are buttons, menus, or other items that can be added to the Quick Access Toolbar or to the Ribbon under File tab | Options | Quick Access Toolbar or via File | Options | Customize Ribbon, respectively.\n\nIf you enable this policy setting then you can specify what commands in the user interface for Word are disabled.\n\nIf you disable or do not configure this policy setting, the  commands in the predefined list are all enabled in Word.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\disabledcmdbaritemscheckboxes","registrySubPath":"sendtomailrecipient","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_Disablecommandbarbuttonsandmenuitems;L_FileWebPagePreview","uniqueId":5121,"displayName":"File tab | Options | (\"Customize Ribbon\" or \"Quick Access Toolbar\") | All Commands | Web Page Preview","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"3655","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable some specific commands in Microsoft Word. Commands are buttons, menus, or other items that can be added to the Quick Access Toolbar or to the Ribbon under File tab | Options | Quick Access Toolbar or via File | Options | Customize Ribbon, respectively.\n\nIf you enable this policy setting then you can specify what commands in the user interface for Word are disabled.\n\nIf you disable or do not configure this policy setting, the  commands in the predefined list are all enabled in Word.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\disabledcmdbaritemscheckboxes","registrySubPath":"filewebpagepreview","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_Disablecommandbarbuttonsandmenuitems;L_InsertHyperlinkWd","uniqueId":5123,"displayName":"Insert tab | Links | Hyperlink","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1576","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable some specific commands in Microsoft Word. Commands are buttons, menus, or other items that can be added to the Quick Access Toolbar or to the Ribbon under File tab | Options | Quick Access Toolbar or via File | Options | Customize Ribbon, respectively.\n\nIf you enable this policy setting then you can specify what commands in the user interface for Word are disabled.\n\nIf you disable or do not configure this policy setting, the  commands in the predefined list are all enabled in Word.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\disabledcmdbaritemscheckboxes","registrySubPath":"inserthyperlink","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroMacrosWd","uniqueId":5126,"displayName":"Developer tab | Code | Macros","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"186","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable some specific commands in Microsoft Word. Commands are buttons, menus, or other items that can be added to the Quick Access Toolbar or to the Ribbon under File tab | Options | Quick Access Toolbar or via File | Options | Customize Ribbon, respectively.\n\nIf you enable this policy setting then you can specify what commands in the user interface for Word are disabled.\n\nIf you disable or do not configure this policy setting, the  commands in the predefined list are all enabled in Word.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacromacros","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroRecordNewMacro","uniqueId":5127,"displayName":"Developer tab | Code | Record Macro","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"2780","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable some specific commands in Microsoft Word. Commands are buttons, menus, or other items that can be added to the Quick Access Toolbar or to the Ribbon under File tab | Options | Quick Access Toolbar or via File | Options | Customize Ribbon, respectively.\n\nIf you enable this policy setting then you can specify what commands in the user interface for Word are disabled.\n\nIf you disable or do not configure this policy setting, the  commands in the predefined list are all enabled in Word.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacrorecord","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroSecurity","uniqueId":5128,"displayName":"Developer tab | Code | Macro Security","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"3627","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable some specific commands in Microsoft Word. Commands are buttons, menus, or other items that can be added to the Quick Access Toolbar or to the Ribbon under File tab | Options | Quick Access Toolbar or via File | Options | Customize Ribbon, respectively.\n\nIf you enable this policy setting then you can specify what commands in the user interface for Word are disabled.\n\nIf you disable or do not configure this policy setting, the  commands in the predefined list are all enabled in Word.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacrosecurity","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroVisualBasicEditorWd","uniqueId":5129,"displayName":"Developer tab | Code | Visual Basic","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1695","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable some specific commands in Microsoft Word. Commands are buttons, menus, or other items that can be added to the Quick Access Toolbar or to the Ribbon under File tab | Options | Quick Access Toolbar or via File | Options | Customize Ribbon, respectively.\n\nIf you enable this policy setting then you can specify what commands in the user interface for Word are disabled.\n\nIf you disable or do not configure this policy setting, the  commands in the predefined list are all enabled in Word.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacrovbe","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsMacroWd","uniqueId":5125,"displayName":"View tab | Macros | Macros","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"16106","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable some specific commands in Microsoft Word. Commands are buttons, menus, or other items that can be added to the Quick Access Toolbar or to the Ribbon under File tab | Options | Quick Access Toolbar or via File | Options | Customize Ribbon, respectively.\n\nIf you enable this policy setting then you can specify what commands in the user interface for Word are disabled.\n\nIf you disable or do not configure this policy setting, the  commands in the predefined list are all enabled in Word.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\disabledcmdbaritemscheckboxes","registrySubPath":"toolsmacro","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsProtectDocument","uniqueId":5124,"displayName":"File tab | Info | Protect Document","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"16129","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable some specific commands in Microsoft Word. Commands are buttons, menus, or other items that can be added to the Quick Access Toolbar or to the Ribbon under File tab | Options | Quick Access Toolbar or via File | Options | Customize Ribbon, respectively.\n\nIf you enable this policy setting then you can specify what commands in the user interface for Word are disabled.\n\nIf you disable or do not configure this policy setting, the  commands in the predefined list are all enabled in Word.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\disabledcmdbaritemscheckboxes","registrySubPath":"flyoutanchorprotectdocumentmenu","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_Disablecommandbarbuttonsandmenuitems;L_ToolsTemplatesandAddIns","uniqueId":5130,"displayName":"Developer tab | Templates | Document Template","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"751","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable some specific commands in Microsoft Word. Commands are buttons, menus, or other items that can be added to the Quick Access Toolbar or to the Ribbon under File tab | Options | Quick Access Toolbar or via File | Options | Customize Ribbon, respectively.\n\nIf you enable this policy setting then you can specify what commands in the user interface for Word are disabled.\n\nIf you disable or do not configure this policy setting, the  commands in the predefined list are all enabled in Word.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\disabledcmdbaritemscheckboxes","registrySubPath":"toolstemplateaddins","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_Disablecommandbarbuttonsandmenuitems;L_WebAddressWd","uniqueId":5131,"displayName":"File tab | Options | (\"Customize Ribbon\" or \"Quick Access Toolbar\") | All Commands | Document Location","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1740","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable some specific commands in Microsoft Word. Commands are buttons, menus, or other items that can be added to the Quick Access Toolbar or to the Ribbon under File tab | Options | Quick Access Toolbar or via File | Options | Customize Ribbon, respectively.\n\nIf you enable this policy setting then you can specify what commands in the user interface for Word are disabled.\n\nIf you disable or do not configure this policy setting, the  commands in the predefined list are all enabled in Word.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\disabledcmdbaritemscheckboxes","registrySubPath":"webaddress","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_Disablefeaturesnotsupportedbyspecifiedbrowsers","uniqueId":4879,"displayName":"Disable features not supported by specified browsers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Browser","Web Options...","Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\internet","registrySubPath":"donotoptimizeforbrowser","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DisableIRMOnXPSExport","uniqueId":5175,"displayName":"Turn off IRM protection on XPS Export for Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy controls the default IRM protection setting when exporting Word documents to XPS files.\n\nEnabling this policy setting will turn off IRM protection when exporting to XPS, if not explicitly set by users through the Export Options dialog.\n\nIf you disable or don't configure this policy setting, the default IRM protection setting for XPS export is based on previous IRM export selection. \n      ","supportedPlatforms":["Windows"],"tags":["Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security","registrySubPath":"disableirmonxpsexport","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DisableModernCommentsOptOutOption","uniqueId":5182,"displayName":"Hide the modern comments opt-out","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to hide the modern comments opt-out toggle in Word from your users.\n\nNote: This opt-out toggle is only temporary and will eventually be removed from Word.\n\nIf you enable this policy setting, the toggle to turn off modern comments will be hidden from your users.\n\nIf you disable or don't configure this policy setting, your users will be able to temporarily turn off the new modern comments experience from the Options menu in Word. \n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n      ","supportedPlatforms":["Windows"],"tags":["General","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"moderncommentsoptoutvisibility","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DisableMRUlistinfontdropdown","uniqueId":5150,"displayName":"Disable MRU list in font dropdown","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"description":"This policy allows you to hide the list of recently used fonts found under Home tab | Font.\n\nIf you enable this policy setting, the list of recently used fonts will not be shown.\n\nIf you disable or do not configure this policy setting, the list of recently used fonts will be shown.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"nofontmrulist","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_DisableOfficeStartWord","uniqueId":5159,"displayName":"Disable the Office Start screen for Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the Office Start screen appears on boot for Word.\n\nIf you enable this policy setting, users will not see the Office Start screen when they boot Word.\n\nIf you disable or do not configure this policy setting, users will see the Office Start screen when they boot Word.\n\nNote: This policy setting is overridden by the policy setting \"Microsoft Office 2016 > Miscellaneous > Disable the Office Start screen for all Office applications\" if that policy setting is set.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"disableboottoofficestart","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DisableRTC","uniqueId":5168,"displayName":"Disable Real Time Coauthoring for Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy lets admins disable Real Time Coauthoring. They may want to do so if they have solutions that are not compatible with some elements of real time coauthoring, such as add-ins that would trigger too often due to Real Time Coauthoring causing the frequent saving of user content. \n\nIf you enable this policy setting, it will prevent Real Time Coauthoring. \n\nIf you disable or do not configure this policy setting, users will be able to experience Real Time Coauthoring feature.","supportedPlatforms":["Windows"],"tags":["Co-authoring","Collaboration Settings","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\coauthoring","registrySubPath":"disablerealtimecoauth","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_disableshortcutkeys175","uniqueId":5141,"displayName":"Disable shortcut keys","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_disableshortcutkeys175;L_Enterakeyandmodifiertodisable","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable any shortcut key by using its virtual key code ID, including shortcut keys that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter a virtual key code ID number to disable a specific shortcut key.\n\nIf you disable or do not configure this policy setting, all default shortcut keys are enabled for users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_disableshortcutkeys175;L_Enterakeyandmodifiertodisable","uniqueId":5140,"displayName":"Enter a key and modifier to disable","settingType":{"possibleValues":{"possibleValuesType":"List","ValueType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to disable any shortcut key by using its virtual key code ID, including shortcut keys that are not in the predefined lists.\n\nIf you enable this policy setting, you can enter a virtual key code ID number to disable a specific shortcut key.\n\nIf you disable or do not configure this policy setting, all default shortcut keys are enabled for users.","supportedPlatforms":["Windows"],"tags":["Custom","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\disabledshortcutkeyslist","registryPath":"KeyMod","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_Disableshortcutkeys;L_AltF11ToolsMacroVisualBasicEditorWd","uniqueId":5136,"displayName":"Alt+F11 (Developer | Code | Visual Basic)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"122,16","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific shortcut key combinations in the specified applications. \n\nIf you enable this policy setting you can disable specific shortcut keys for the selected application.  The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\disabledshortcutkeyscheckboxes","registrySubPath":"toolsmacrovbe","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_Disableshortcutkeys;L_AltF8ToolsMacroMacros","uniqueId":5135,"displayName":"Alt+F8 (Developer | Code | Macros)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"119,16","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific shortcut key combinations in the specified applications. \n\nIf you enable this policy setting you can disable specific shortcut keys for the selected application.  The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\disabledshortcutkeyscheckboxes","registrySubPath":"toolsmacromacros","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_Disableshortcutkeys;L_CtrlFFindWd","uniqueId":5133,"displayName":"Ctrl+F (Home | Editing | Find)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"70,8","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific shortcut key combinations in the specified applications. \n\nIf you enable this policy setting you can disable specific shortcut keys for the selected application.  The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\disabledshortcutkeyscheckboxes","registrySubPath":"find","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_Disableshortcutkeys;L_CtrlKInsertHyperlinkWd","uniqueId":5134,"displayName":"Ctrl+K (Insert | Links | Hyperlink)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"75,8","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":"0","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"0","description":"This policy setting allows you to disable specific shortcut key combinations in the specified applications. \n\nIf you enable this policy setting you can disable specific shortcut keys for the selected application.  The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\disabledshortcutkeyscheckboxes","registrySubPath":"inserthyperlink","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_Disableshortcutkeys","uniqueId":5137,"displayName":"Disable shortcut keys","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Disableshortcutkeys;L_CtrlFFindWd","logicalOperator":"exists","values":null},{"dependee":"word16;L_Disableshortcutkeys;L_CtrlKInsertHyperlinkWd","logicalOperator":"exists","values":null},{"dependee":"word16;L_Disableshortcutkeys;L_AltF8ToolsMacroMacros","logicalOperator":"exists","values":null},{"dependee":"word16;L_Disableshortcutkeys;L_AltF11ToolsMacroVisualBasicEditorWd","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to disable specific shortcut key combinations in the specified applications. \n\nIf you enable this policy setting you can disable specific shortcut keys for the selected application.  The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting. \n\nIf you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.","supportedPlatforms":["Windows"],"tags":["Predefined","Disable Items in User Interface","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_DisableTrustBarNotificationforunsigned","uniqueId":4947,"displayName":"Disable Trust Bar Notification for unsigned application add-ins and block them","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable such add-ins without notification. This policy setting only applies if you enable the \"Require that application add-ins are signed by Trusted Publisher\" policy setting, which prevents users from changing this policy setting.\n\nIf you enable this policy setting, applications automatically disable unsigned add-ins without informing users.\n \nIf you disable this policy setting, if this application is configured to require that all add-ins be signed by a trusted publisher, any unsigned add-ins the application loads will be disabled and the application will display the Trust Bar at the top of the active window. The Trust Bar contains a message that informs users about the unsigned add-in.\n\nIf you do not configure this policy setting, the disable behavior applies, and in addition, users can configure this requirement themselves in the \"Add-ins\" category of the Trust Center for the application.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security","registrySubPath":"notbpromptunsignedaddin","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DisableTrustedLoc","uniqueId":4983,"displayName":"Disable all trusted locations","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows administrators to disable all trusted locations in the specified applications. Trusted locations specified in the Trust Center are used to define file locations that are assumed to be safe. Content, code, and add-ins are allowed to load from trusted locations with a minimal amount of security, without prompting the users for permission. If a dangerous file is opened from a trusted location, it will not be subject to standard security measures and could harm users' computers or data.\n      \nIf you enable this policy setting, all trusted locations (those specified in the Trust Center) in the specified applications are ignored, including any trusted locations established by Office 2016 during setup, deployed to users using Group Policy, or added by users themselves.  Users will be prompted again when opening files from trusted locations.\n\nIf you disable or do not configure this policy setting, all trusted locations (those specified in the Trust Center) in the specified applications are assumed to be safe.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations","registrySubPath":"alllocationsdisabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DisableWarningOnIncludeFieldsUpdate","uniqueId":5177,"displayName":"Don’t ask permission before updating IncludePicture and IncludeText fields in Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether Word prompts the user with a security message before updating IncludePicture and IncludeText fields in the document.\n\nBy default, the user is prompted with a security message before those fields are updated. But, the prompt might effect automated workflows that merge Word documents.\n\nImportant: Fields that contain IncludePicture and IncludeText references can be used for data exfiltration or phishing exploits. A field containing these references can be modified to point to external websites for content. If credentials are required for accessing the picture or text, the process of updating the field will request a sign-in from the user. While this is a legitimate scenario for trusted sources, it is vulnerable to phishing if the document is not from a trusted source.\n\nIf you enable this policy setting, the user won’t be prompted with a security message before those fields are updated. Enabling this policy setting is not recommended because of the possible security implications.\n\nIf you disable or don’t configure this policy setting, the user will be prompted with a security message before those fields are updated.\n      ","supportedPlatforms":["Windows"],"tags":["Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security","registrySubPath":"disablewarningonincludefieldsupdate","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DisplayDeveloperTab","uniqueId":4792,"displayName":"Display Developer tab in the Ribbon","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the Developer tab will be displayed in the Ribbon.\n\nIf you enable this policy setting, the Developer tab will be displayed in the Ribbon.\n\nIf you disable this policy setting, the Developer tab will not be displayed in the Ribbon.\n\nIf you do not configure this policy setting, the Developer tab will not be displayed in the Ribbon, but its visibility can be changed via a setting in the application Options dialog box.","supportedPlatforms":["Windows"],"tags":["Customize Ribbon","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"developertools","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Documentproperties","uniqueId":4796,"displayName":"Print document properties","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control the \"Print document properties\" setting found under File tab | Options | Display | Printing options.\n\nIf you enable this policy setting, Word will print an additional page with the printed document's properties, including the document's author, filename, creation date, etc., for every document that is printed.\n\nIf you disable or do not configure this policy setting, no additional page will be printed.","supportedPlatforms":["Windows"],"tags":["Display","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vprsu","registrySubPath":"summary_1_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Documentview","uniqueId":4851,"displayName":"Document view","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Documentview;L_documentview7","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Used for complex scripts. Specifies if documents shall be displayed Right-to-left or Left-to-right.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Documentview;L_documentview7","uniqueId":4850,"displayName":"Document view","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Right-to-left","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Left-to-Right","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"Used for complex scripts. Specifies if documents shall be displayed Right-to-left or Left-to-right.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"docviewdir","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DoNotAutomaticallyMergeServerAndLocalDocument","uniqueId":5143,"displayName":"Do not automatically merge server and local document","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines if changes made to a server document should be automatically merged with the locally-cached copy of the document on the next save. This policy pertains to the co-authoring experience in Word.\n\nIf you enable this policy setting, then changes made to a server document will not be automatically merged with the locally-cached copy of the document on the next save. \n\nIf you disable or do not configure this policy setting, then changes made to a server document will be automatically merged with the locally-cached copy of the document on the next save.","supportedPlatforms":["Windows"],"tags":["Co-authoring","Collaboration Settings","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\coauthoring","registrySubPath":"disableautomerge","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DoNotCompressInlinedImagesInOutlook","uniqueId":5179,"displayName":"Do not compress the inlined images inserted in Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to disable compression on inlined images in Outlook.\n\nIf you enable this policy setting, Outlook won't compress inlined images in the message.\n\nIf you disable or don't configure this policy setting, inlined images would be compressed.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n      ","supportedPlatforms":["Windows"],"tags":["E-mail Options","Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\mailsettings","registrySubPath":"outlookdonotcompressimages","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DoNotDisplayFileFormatCompatiblityDialogForODT","uniqueId":4811,"displayName":"Do not display file format compatibility dialog box for OpenDocument text format","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to configure the file format compatibility dialog box when saving a file as an OpenDocument text file in Word.\n      \nIf you enable this policy setting, the file format compatibility dialog is not displayed whenever you save as an OpenDocument text file in Word.\n      \nIf you disable or do not configure this policy setting, the file format compatibility dialog is displayed when you save as an OpenDocument text file in Word.","supportedPlatforms":["Windows"],"tags":["Save","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"disablesaveaslosswarningopendocumenttext","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DoNotEnableAdditionalActionsInTheRightClickMenu","uniqueId":4881,"displayName":"Do not enable additional actions in the right-click menu","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to configure the \"Enable additional actions in the right-click menu\" button found under File tab | Options | Proofing | Autocorrect Options... | Actions.\n\nIf you enable this policy setting, the checkbox will not be checked, and Additional Actions recognition will be turned off.\n\nIf you disable or do not configure this policy setting, the checkbox will be checked, and Additional Actions recognition will be turned on.","supportedPlatforms":["Windows"],"tags":["Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"nosmarttagrecognition","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DoNotOpenFilesFromTheInternetZoneInProtectedView","uniqueId":5086,"displayName":"Do not open files from the internet zone in Protected View","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting allows you to determine if files downloaded from the internet zone open in Protected View.\n\nIf you enable this policy setting, files downloaded from the internet zone do not open in Protected View.\n\nIf you disable or do not configure this policy setting, files downloaded from the internet zone open in Protected View.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\protectedview","registrySubPath":"disableinternetfilesinpv","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DoNotOpenFilesInUnsafeLocationsInProtectedView","uniqueId":5085,"displayName":"Do not open files in unsafe locations in Protected View","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting lets you determine if files located in unsafe locations will open in Protected View.  If you have not specified unsafe locations, only the \"Downloaded Program Files\" and \"Temporary Internet Files\" folders are considered unsafe locations.\n\nIf you enable this policy setting, files located in unsafe locations do not open in Protected View.\n\nIf you disable or do not configure this policy setting, files located in unsafe locations open in Protected View.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\protectedview","registrySubPath":"disableunsafelocationsinpv","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DoNotUseOnlineMachineTranslation","uniqueId":5147,"displayName":"Do not use online machine translation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to prevent online machine translation services from being used for the translation of documents and text through the Research pane.\n\nIf you enable this policy setting, online machine translation services cannot be used to translate documents and text through the Research pane.\n\nIf you disable or do not configure this policy setting, online machine translation services can be used to translate text through the Research pane.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\research\\translation","registrySubPath":"usemt","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_DoNotUseOnlineTranslationDictionaries","uniqueId":5148,"displayName":"Use online translation dictionaries","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to prevent online dictionaries from being used for the translation of text through the Research pane.\n\nIf you enable or do not configure this policy setting, the online dictionaries can be used to translate text through the Research pane.\n\nIf you disable this policy setting, the online dictionaries cannot be used to translate text through the Research pane.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\research\\translation","registrySubPath":"useonline","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Draftfont","uniqueId":4849,"displayName":"Use draft font in Draft and Outline views","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"draftfont","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Draftoutput","uniqueId":4864,"displayName":"Use draft quality","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vprsu","registrySubPath":"draftoutput_2_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Draganddroptextediting","uniqueId":4820,"displayName":"Allow text to be dragged and dropped","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"draganddroptext","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Drawingobjects","uniqueId":4797,"displayName":"Print drawings created in Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to configure the \"Print drawings created in Word\" setting found under File tab | Options | Display | Printing options.\n\nIf you enable this policy setting, Word will print graphics and floating text boxes. \n\nIf you disable or do not configure this policy setting, Word will not print graphics or floating text boxes.  Instead, Word will print a blank box in the place of each graphic and floating text box.","supportedPlatforms":["Windows"],"tags":["Display","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vprsu","registrySubPath":"disabledrawnobj_14_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Drawings","uniqueId":4840,"displayName":"Show drawings and text boxes on screen","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"showdrawings","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Enableclickandtype","uniqueId":4826,"displayName":"Enable click and type","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"clickandtype","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_EnableLivePreview","uniqueId":4736,"displayName":"Enable Live Preview","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting configures the \"Enable Live Preview\" checkbox found under File tab | Options | General.  Live Preview shows how a command would be applied without actually applying it to the document.\n\nIf you enable this policy setting, the option is checked, and Live Preview will be shown when using Galleries that support previews\n\nIf you disable or do not configure this policy setting, the option is unchecked, and Live Preview will be hidden when using Galleries that support previews.","supportedPlatforms":["Windows"],"tags":["General","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"livepreview","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_EnglishWord6095documents","uniqueId":4877,"displayName":"English Word 6.0/95 documents","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_EnglishWord6095documents;L_englishword6095documents11","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Sets the option to convert the file correctly.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_EnglishWord6095documents;L_englishword6095documents11","uniqueId":4876,"displayName":"English Word 6.0/95 documents","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Contain Asian text","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open normally","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Automatically detect Asian text","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Sets the option to convert the file correctly.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"asiantext","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_ExpandCollapseUIMaximumZoomLevel","uniqueId":5167,"displayName":"Set the maximum zoom level for expand / collapse on-object UI","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_ExpandCollapseUIMaximumZoomLevel;L_SetExpandCollapseUIMaximumZoomLevelSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the maximum zoom level percentage at which point the expand/collapse on-object UI stops rendering.  Regardless of the value specified for this policy setting, the expand / collapse feature is still available from the context menu for headings.\n\nIf you enable this policy setting, you can specify a maximum zoom level percentage from 0-500. If you specify a value of 0, the on-object UI never renders.\n\nIf you disable or do not configure this policy setting, there will be no maximum.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_ExpandCollapseUIMaximumZoomLevel;L_SetExpandCollapseUIMaximumZoomLevelSpinID","uniqueId":5166,"displayName":"Set the maximum zoom level for expand / collapse on-object UI","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":500},"dataType":"Integer"},"defaultValue":"","description":"This policy setting allows you to specify the maximum zoom level percentage at which point the expand/collapse on-object UI stops rendering.  Regardless of the value specified for this policy setting, the expand / collapse feature is still available from the context menu for headings.\n\nIf you enable this policy setting, you can specify a maximum zoom level percentage from 0-500. If you specify a value of 0, the on-object UI never renders.\n\nIf you disable or do not configure this policy setting, there will be no maximum.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"maxeczoom","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_ExpandCollapseUIMinimumZoomLevel","uniqueId":5165,"displayName":"Set the minimum zoom level for expand / collapse on-object UI","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_ExpandCollapseUIMinimumZoomLevel;L_SetExpandCollapseUIMinimumZoomLevelSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the minimum zoom level percentage at which point the expand/collapse on-object UI stops rendering.  Regardless of the value specified for this policy setting, the expand / collapse feature is still available from the context menu for headings.\n\nIf you enable this policy setting, you can specify a minimum zoom level percentage from 0-500.\n\nIf you disable or do not configure this policy setting, the minimum zoom level is set to 50%.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_ExpandCollapseUIMinimumZoomLevel;L_SetExpandCollapseUIMinimumZoomLevelSpinID","uniqueId":5164,"displayName":"Set the minimum zoom level for expand / collapse on-object UI","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":500},"dataType":"Integer"},"defaultValue":"50","description":"This policy setting allows you to specify the minimum zoom level percentage at which point the expand/collapse on-object UI stops rendering.  Regardless of the value specified for this policy setting, the expand / collapse feature is still available from the context menu for headings.\n\nIf you enable this policy setting, you can specify a minimum zoom level percentage from 0-500.\n\nIf you disable or do not configure this policy setting, the minimum zoom level is set to 50%.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"mineczoom","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Fieldcodes","uniqueId":4844,"displayName":"Show field codes instead of their values","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"showfieldvalues","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Fieldshading","uniqueId":4846,"displayName":"Field shading","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Fieldshading;L_fieldshading6","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies when field shading is displayed.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Fieldshading;L_fieldshading6","uniqueId":4845,"displayName":"Field shading","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Never","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Always","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"When selected","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Specifies when field shading is displayed.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"shadefields","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Firstlineindent","uniqueId":4771,"displayName":"First line indent","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the option \"Spaces at beginning of paragraph with first-line indent\" in the group \"Replace as you type.\" This option may be hidden in Word until certain editing languages are enabled.","supportedPlatforms":["Windows"],"tags":["Replace as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"ffirstindent_344_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Formatbeginningoflistitemliketheonebeforeit","uniqueId":4787,"displayName":"Format beginning of list item like the one before it","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Automatically as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"fleadinemph_176_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Fractions12withfractioncharacter","uniqueId":4774,"displayName":"Fractions (1/2) with fraction character","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Replace as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"ffraction_96_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Frontofsheet","uniqueId":4867,"displayName":"Print on front of the sheet for duplex printing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vprsu","registrySubPath":"fprorder1_21_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Headings","uniqueId":4778,"displayName":"Headings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the option ''Built in Heading styles''.","supportedPlatforms":["Windows"],"tags":["Apply as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"fheading_280_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Hiddentext","uniqueId":4800,"displayName":"Hidden text","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether text that is formatted as hidden displays on Word users' monitor screens.\n\nIf you enable this policy setting, Word displays hidden text at all times. Hidden text on monitor screens displays as underlined with a dotted line.\n\nIf you disable or do not configure this policy setting, Word does not display text formatted as hidden unless \"Show/Hide ¶\" is selected or Word is configured to show hidden text in the \"Display\" section of the \"Word Options\" dialog.","supportedPlatforms":["Windows"],"tags":["Display","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"showhiddentext","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_HidePiiRemovedWarningBar","uniqueId":5094,"displayName":"Hide the PII Removed Warning Bar","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the yellow Warning Bar is displayed when opening a file in Word where personally identifiable information (PII) has been removed.\n\nIf you enable this policy setting, the Warning Bar will not appear when users open a file in which PII was removed.\n\nIf you disable this policy setting, the Warning Bar will appear when users open a file in which PII was removed. This is the default behavior.\n\nIf you do not configure this policy setting, the Warning Bar will appear when users open a file in which PII was removed. This is the default behavior.","supportedPlatforms":["Windows"],"tags":["Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"hidepiiremovedwarningbar","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Highlight","uniqueId":4793,"displayName":"Show highlighter marks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls highlighter marks.\n\nIf you enable this policy setting, highlighter marks, both on screen and when printing, will be shown.\n\nIf you disable or do not configure this policy setting, highlighter marks, both on screen and when printing, will be hidden.","supportedPlatforms":["Windows"],"tags":["Display","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"showhighlight","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Horizontalscrollbar","uniqueId":4860,"displayName":"Show horizontal scroll bar","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"horizontalscrollbar","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Ignorepunctuationcharacters","uniqueId":5112,"displayName":"Ignore punctuation characters","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to check or uncheck the corresponding UI option in the \"Japanese Find\" dialog.  The \"Japanese Find\" dialog may be accessed from the Find dialog, under Home tab | Editing | Find | Go To... | Search Options | Options....  It could also be found under the Navigation Pane, under Home tab | Editing | Find | < down arrow > | Options... | Sounds Like (Japanese) | Options.  The \"Sounds like (Japanese)\" checkbox and the \"Options...\" button may be hidden in Word until certain editing languages are enabled.\n\nIf you enable this policy setting, you will check the corresponding UI option as specified in this policy setting's title.\n\nIf you disable or do not configure this policy setting, the corresponding UI option will be unchecked.\n","supportedPlatforms":["Windows"],"tags":["Japanese Find","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpreffuz","registrySubPath":"fignorepunct_18_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_IgnoreWhiteSpace","uniqueId":4744,"displayName":"Ignore White Space","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This option determines if white space is compared in document compare. This corresponds to the option in the Compare dialog box ( Review ribbon | Compare | more options).","supportedPlatforms":["Windows"],"tags":["Track changes and compare","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"compareignorewhitespace","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Ignorewhitespacecharacters","uniqueId":5113,"displayName":"Ignore whitespace characters","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to check or uncheck the corresponding UI option in the \"Japanese Find\" dialog.  The \"Japanese Find\" dialog may be accessed from the Find dialog, under Home tab | Editing | Find | Go To... | Search Options | Options....  It could also be found under the Navigation Pane, under Home tab | Editing | Find | < down arrow > | Options... | Sounds Like (Japanese) | Options.  The \"Sounds like (Japanese)\" checkbox and the \"Options...\" button may be hidden in Word until certain editing languages are enabled.\n\nIf you enable this policy setting, you will check the corresponding UI option as specified in this policy setting's title.\n\nIf you disable or do not configure this policy setting, the corresponding UI option will be unchecked.\n","supportedPlatforms":["Windows"],"tags":["Japanese Find","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpreffuz","registrySubPath":"fignorespace_19_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_IMEControlActive","uniqueId":4834,"displayName":"IME Control Active","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option. This option only appears if you configure Word to use an IME.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"imecontrolactive","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_IMETrueInLine","uniqueId":4835,"displayName":"IME TrueInLine","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option. This option only appears if you configure Word to use an IME.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"imetrueinline","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_InsertClosingPhraseToMatchJapaneseSalutation","uniqueId":4791,"displayName":"Insert closing phrase to match Japanese salutation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the option \"Insert closing phrase to match Japanese salutation.\"  This option may be hidden in Word until certain editing languages are enabled.","supportedPlatforms":["Windows"],"tags":["Automatically as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"finsertclosing_408_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_InsertClosingPhraseToMatchMemoStyle","uniqueId":4790,"displayName":"Insert closing phrase to match memo style","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the option \"Insert closing phrase to match memo style.\"  This option may be hidden in Word until certain editing languages are enabled.","supportedPlatforms":["Windows"],"tags":["Automatically as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"finsertover_424_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Insertionscolor","uniqueId":4743,"displayName":"Insertions color","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Insertionscolor;L_InsertionscolorPart","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Selects the default color for tracked insertions. This corresponds to the choices in the Review ribbon | Track changes | Change tracking options dialog box.","supportedPlatforms":["Windows"],"tags":["Track changes and compare","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Insertionscolor;L_InsertionscolorPart","uniqueId":4742,"displayName":"Color for tracking insertions:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"By Author","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"None","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Black","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Blue","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Turquoise","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Bright Green","description":"","tags":[],"dependencyGroup":null},{"value":6,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Pink","description":"","tags":[],"dependencyGroup":null},{"value":7,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Red","description":"","tags":[],"dependencyGroup":null},{"value":8,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yellow","description":"","tags":[],"dependencyGroup":null},{"value":9,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"White","description":"","tags":[],"dependencyGroup":null},{"value":10,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Blue","description":"","tags":[],"dependencyGroup":null},{"value":11,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Teal","description":"","tags":[],"dependencyGroup":null},{"value":12,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Green","description":"","tags":[],"dependencyGroup":null},{"value":13,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Violet","description":"","tags":[],"dependencyGroup":null},{"value":14,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Red","description":"","tags":[],"dependencyGroup":null},{"value":15,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Yellow","description":"","tags":[],"dependencyGroup":null},{"value":16,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gray 50%","description":"","tags":[],"dependencyGroup":null},{"value":17,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gray 25%","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Selects the default color for tracked insertions. This corresponds to the choices in the Review ribbon | Track changes | Change tracking options dialog box.","supportedPlatforms":["Windows"],"tags":["Track changes and compare","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"revmodeinscolor","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_KeepLastAutoSavedVersions","uniqueId":4807,"displayName":"Keep the last AutoSaved versions of files for the next session","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether Word keeps the last AutoSaved version of a file if a user closes a file without saving it.  (Note: AutoSave applies only when AutoRecover is enabled.)\n\nIf you enable or do not configure this policy setting, Word keeps the last AutoSaved version of the file and makes it available to the user the next time the file is opened if the user closes a file without saving it.\n\nIf you disable this policy setting, Word does not keep the last AutoSaved version of the file if the user closes a file without saving it.","supportedPlatforms":["Windows"],"tags":["Save","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"keepunsavedchanges","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Keeptrackofformatting","uniqueId":4906,"displayName":"Keep track of formatting","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"trackformatting","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Leftscrollbar","uniqueId":4862,"displayName":"Left scroll bar","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option. This option is only available if support for right-to-left languages is enabled through Microsoft Office Language Preferences.  This setting also sets Right ruler (Print view only).","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"bidicontrols","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_LegacyConvertersForWord","uniqueId":4979,"displayName":"Legacy converters for Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_LegacyConvertersForWord;L_LegacyConvertersForWordDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_LegacyConvertersForWord;L_LegacyConvertersForWordDropID","uniqueId":4978,"displayName":"File block setting: ","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\fileblock","registrySubPath":"converters","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_LinkedInResumeAssistant","uniqueId":5170,"displayName":"Allow LinkedIn Resume Assistant feature","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether the LinkedIn Resume Assistant appears in Word.\n\nIf you enable or do not configure this policy, users will be able to use the LinkedIn Resume Assistant.\n\nIf you disable this policy setting, the LinkedIn Resume Assistant will not be available.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise, and to subscription versions of Project and Visio.\n      ","supportedPlatforms":["Windows"],"tags":["General","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"linkedinresumeassistant","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Listoferrormessagestocustomize","uniqueId":5120,"displayName":"List of error messages to customize","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Listoferrormessagestocustomize;L_listoferrormessagestocustomize97","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines a list of custom error messages to activate.","supportedPlatforms":["Windows"],"tags":["Customizable Error Messages","Microsoft Word 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\customizablealerts","registrySubPath":"policyon","enforcedValues":{"enabled":1}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\customizablealerts","registrySubPath":"policyon","enforcedValues":{"enabled":1}}]}}},{"id":"word16;L_Listoferrormessagestocustomize;L_listoferrormessagestocustomize97","uniqueId":5119,"displayName":"List of error messages to customize","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"Defines a list of custom error messages to activate.","supportedPlatforms":["Windows"],"tags":["Customizable Error Messages","Microsoft Word 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\customizablealerts","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_ListOfManagedAddins","uniqueId":5154,"displayName":"List of managed add-ins","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_ListOfManagedAddins;L_ListOfManagedAddins2","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify which add-ins are always enabled, always disabled (blocked), or configurable by the user. To block add-ins that are not managed by this policy setting, you must also configure the \"Block all unmanaged add-ins\" policy setting.\n\nTo enable this policy setting, provide the following information for each add-in:\n\nIn \"Value name,\" specify the programmatic identifier (ProgID) for COM add-ins, or specify the file name of Word add-ins.\n\nTo obtain the ProgID for an add-in, use Registry Editor on the client computer where the add-in is installed to locate key names under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Office\\Word\\Addins or HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Office\\Word\\Addins.\n\nTo obtain the file name of an add-in, click the File menu in the application where the add-in is installed. Click Options, click Add-ins, and then use the Location column to determine the file name of the add-in.\n\nYou can also obtain the ProgID or the file name of an add-in by using Office Telemetry Dashboard.\n\nIn \"Value,\" specify the value as follows:\n\nTo specify that an add-in is always disabled (blocked), type 0.\n\nTo specify that an add-in is always enabled, type 1.\n\nTo specify that an add-in is configurable by the user and not blocked by the \"Block all unmanaged add-ins\" policy setting when enabled, type 2.\n\nIf you disable or do not enable this policy setting, the list of managed add-ins is deleted. If the \"Block all unmanaged add-ins\" policy setting is enabled, then all add-ins are blocked.\n\nTo specify that a Word add-in is always enabled, in addition to configuring this policy setting, you must also specify a location that is used as a trusted source for open files in Word. To do this, configure the \"Trusted Locations\" policy setting at User Configuration\\Administrative Templates\\Microsoft Word 2016\\Word Options\\Security\\Trust Center, and then move the add-in file into the trusted location.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Word 2016","Cloud Policies Collection","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"","registrySubPath":"","registryType":"","registryHiveType":"User","associatedValues":[{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\resiliency\\addinlist","registrySubPath":"policyon","enforcedValues":{"enabled":1}},{"registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\resiliency\\addinlist","registrySubPath":"policyon","enforcedValues":{"enabled":1}}]}}},{"id":"word16;L_ListOfManagedAddins;L_ListOfManagedAddins2","uniqueId":5153,"displayName":"List of managed add-ins","settingType":{"possibleValues":{"possibleValuesType":"Dictionary","ValueType":"string","KeyType":"string"},"dataType":"Collection"},"description":"This policy setting allows you to specify which add-ins are always enabled, always disabled (blocked), or configurable by the user. To block add-ins that are not managed by this policy setting, you must also configure the \"Block all unmanaged add-ins\" policy setting.\n\nTo enable this policy setting, provide the following information for each add-in:\n\nIn \"Value name,\" specify the programmatic identifier (ProgID) for COM add-ins, or specify the file name of Word add-ins.\n\nTo obtain the ProgID for an add-in, use Registry Editor on the client computer where the add-in is installed to locate key names under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Office\\Word\\Addins or HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Office\\Word\\Addins.\n\nTo obtain the file name of an add-in, click the File menu in the application where the add-in is installed. Click Options, click Add-ins, and then use the Location column to determine the file name of the add-in.\n\nYou can also obtain the ProgID or the file name of an add-in by using Office Telemetry Dashboard.\n\nIn \"Value,\" specify the value as follows:\n\nTo specify that an add-in is always disabled (blocked), type 0.\n\nTo specify that an add-in is always enabled, type 1.\n\nTo specify that an add-in is configurable by the user and not blocked by the \"Block all unmanaged add-ins\" policy setting when enabled, type 2.\n\nIf you disable or do not enable this policy setting, the list of managed add-ins is deleted. If the \"Block all unmanaged add-ins\" policy setting is enabled, then all add-ins are blocked.\n\nTo specify that a Word add-in is always enabled, in addition to configuring this policy setting, you must also specify a location that is used as a trusted source for open files in Word. To do this, configure the \"Trusted Locations\" policy setting at User Configuration\\Administrative Templates\\Microsoft Word 2016\\Word Options\\Security\\Trust Center, and then move the add-in file into the trusted location.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Word 2016","Cloud Policies Collection","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiCollectionKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\resiliency\\addinlist","registryPath":"","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_Makehiddenmarkupvisible","uniqueId":5095,"displayName":"Make hidden markup visible","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"showmarkupopensave","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Markformattinginconsistencies;L_checktoenforcesettingonunchecktoenforcesettingoff18","uniqueId":4907,"displayName":"Check to enforce setting on; uncheck to enforce setting off","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Defines color to use for marking formatting inconsistencies.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"markformatting","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Markformattinginconsistencies;L_Colorformarkingformattinginconsistencies","uniqueId":4908,"displayName":"Color for marking formatting inconsistencies","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Black","description":"","tags":[],"dependencyGroup":null},{"value":255,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Blue","description":"","tags":[],"dependencyGroup":null},{"value":128,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Blue","description":"","tags":[],"dependencyGroup":null},{"value":3368703,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light Blue","description":"","tags":[],"dependencyGroup":null},{"value":52479,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sky Blue","description":"","tags":[],"dependencyGroup":null},{"value":10079487,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Pale Blue","description":"","tags":[],"dependencyGroup":null},{"value":6710937,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Blue Gray","description":"","tags":[],"dependencyGroup":null},{"value":65280,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Green","description":"","tags":[],"dependencyGroup":null},{"value":32768,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Green","description":"","tags":[],"dependencyGroup":null},{"value":13056,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Darker Green","description":"","tags":[],"dependencyGroup":null},{"value":13434828,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light Green","description":"","tags":[],"dependencyGroup":null},{"value":3355392,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Olive Green","description":"","tags":[],"dependencyGroup":null},{"value":3381606,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Sea Green","description":"","tags":[],"dependencyGroup":null},{"value":16711680,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Red","description":"","tags":[],"dependencyGroup":null},{"value":8388608,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Red","description":"","tags":[],"dependencyGroup":null},{"value":16776960,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Yellow","description":"","tags":[],"dependencyGroup":null},{"value":8421376,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Yellow","description":"","tags":[],"dependencyGroup":null},{"value":16777113,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light Yellow","description":"","tags":[],"dependencyGroup":null},{"value":16777215,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"White","description":"","tags":[],"dependencyGroup":null},{"value":10040064,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Brown","description":"","tags":[],"dependencyGroup":null},{"value":16737792,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Orange","description":"","tags":[],"dependencyGroup":null},{"value":16750848,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light Orange","description":"","tags":[],"dependencyGroup":null},{"value":65535,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Cyan","description":"","tags":[],"dependencyGroup":null},{"value":32896,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Cyan","description":"","tags":[],"dependencyGroup":null},{"value":13434879,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light Cyan","description":"","tags":[],"dependencyGroup":null},{"value":16711935,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Magenta","description":"","tags":[],"dependencyGroup":null},{"value":8388736,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Magenta","description":"","tags":[],"dependencyGroup":null},{"value":13158,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Dark Teal","description":"","tags":[],"dependencyGroup":null},{"value":3355545,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Indigo","description":"","tags":[],"dependencyGroup":null},{"value":10079232,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Lime","description":"","tags":[],"dependencyGroup":null},{"value":3394764,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Aqua","description":"","tags":[],"dependencyGroup":null},{"value":16763904,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gold","description":"","tags":[],"dependencyGroup":null},{"value":10040166,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Plum","description":"","tags":[],"dependencyGroup":null},{"value":16751052,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Rose","description":"","tags":[],"dependencyGroup":null},{"value":16764057,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Tan","description":"","tags":[],"dependencyGroup":null},{"value":13408767,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Lavender","description":"","tags":[],"dependencyGroup":null},{"value":8421504,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gray","description":"","tags":[],"dependencyGroup":null},{"value":12632256,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gray 25%","description":"","tags":[],"dependencyGroup":null},{"value":8421504,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gray 50%","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Defines color to use for marking formatting inconsistencies.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"formatconsistencywavyunderlinecolor","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Markformattinginconsistencies","uniqueId":4909,"displayName":"Mark formatting inconsistencies","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Markformattinginconsistencies;L_checktoenforcesettingonunchecktoenforcesettingoff18","logicalOperator":"exists","values":null},{"dependee":"word16;L_Markformattinginconsistencies;L_Colorformarkingformattinginconsistencies","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines color to use for marking formatting inconsistencies.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Matchbavahafa","uniqueId":5106,"displayName":"Match ba/va, ha/fa","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to check or uncheck the corresponding UI option in the \"Japanese Find\" dialog.  The \"Japanese Find\" dialog may be accessed from the Find dialog, under Home tab | Editing | Find | Go To... | Search Options | Options....  It could also be found under the Navigation Pane, under Home tab | Editing | Find | < down arrow > | Options... | Sounds Like (Japanese) | Options.  The \"Sounds like (Japanese)\" checkbox and the \"Options...\" button may be hidden in Word until certain editing languages are enabled.\n\nIf you enable this policy setting, you will check the corresponding UI option as specified in this policy setting's title.\n\nIf you disable or do not configure this policy setting, the corresponding UI option will be unchecked.\n","supportedPlatforms":["Windows"],"tags":["Japanese Find","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpreffuz","registrySubPath":"feqb_v_9_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Matchcase","uniqueId":5096,"displayName":"Match case","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to check or uncheck the corresponding UI option in the \"Japanese Find\" dialog.  The \"Japanese Find\" dialog may be accessed from the Find dialog, under Home tab | Editing | Find | Go To... | Search Options | Options....  It could also be found under the Navigation Pane, under Home tab | Editing | Find | < down arrow > | Options... | Sounds Like (Japanese) | Options.  The \"Sounds like (Japanese)\" checkbox and the \"Options...\" button may be hidden in Word until certain editing languages are enabled.\n\nIf you enable this policy setting, you will check the corresponding UI option as specified in this policy setting's title.\n\nIf you disable or do not configure this policy setting, the corresponding UI option will be unchecked.\n","supportedPlatforms":["Windows"],"tags":["Japanese Find","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpreffuz","registrySubPath":"feqcase_0_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Matchchoonusedforvowels","uniqueId":5104,"displayName":"Match cho-on used for vowels","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to check or uncheck the corresponding UI option in the \"Japanese Find\" dialog.  The \"Japanese Find\" dialog may be accessed from the Find dialog, under Home tab | Editing | Find | Go To... | Search Options | Options....  It could also be found under the Navigation Pane, under Home tab | Editing | Find | < down arrow > | Options... | Sounds Like (Japanese) | Options.  The \"Sounds like (Japanese)\" checkbox and the \"Options...\" button may be hidden in Word until certain editing languages are enabled.\n\nIf you enable this policy setting, you will check the corresponding UI option as specified in this policy setting's title.\n\nIf you disable or do not configure this policy setting, the corresponding UI option will be unchecked.\n","supportedPlatforms":["Windows"],"tags":["Japanese Find","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpreffuz","registrySubPath":"feqlongvowel_7_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Matchcontractionsyoonsokuon","uniqueId":5099,"displayName":"Match contractions (yo-on, sokuon)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to check or uncheck the corresponding UI option in the \"Japanese Find\" dialog.  The \"Japanese Find\" dialog may be accessed from the Find dialog, under Home tab | Editing | Find | Go To... | Search Options | Options....  It could also be found under the Navigation Pane, under Home tab | Editing | Find | < down arrow > | Options... | Sounds Like (Japanese) | Options.  The \"Sounds like (Japanese)\" checkbox and the \"Options...\" button may be hidden in Word until certain editing languages are enabled.\n\nIf you enable this policy setting, you will check the corresponding UI option as specified in this policy setting's title.\n\nIf you disable or do not configure this policy setting, the corresponding UI option will be unchecked.\n","supportedPlatforms":["Windows"],"tags":["Japanese Find","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpreffuz","registrySubPath":"feqsmallkana_4_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Matchdiziduzu","uniqueId":5105,"displayName":"Match di/zi, du/zu","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to check or uncheck the corresponding UI option in the \"Japanese Find\" dialog.  The \"Japanese Find\" dialog may be accessed from the Find dialog, under Home tab | Editing | Find | Go To... | Search Options | Options....  It could also be found under the Navigation Pane, under Home tab | Editing | Find | < down arrow > | Options... | Sounds Like (Japanese) | Options.  The \"Sounds like (Japanese)\" checkbox and the \"Options...\" button may be hidden in Word until certain editing languages are enabled.\n\nIf you enable this policy setting, you will check the corresponding UI option as specified in this policy setting's title.\n\nIf you disable or do not configure this policy setting, the corresponding UI option will be unchecked.\n","supportedPlatforms":["Windows"],"tags":["Japanese Find","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpreffuz","registrySubPath":"feqd_z_8_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Matchfullhalfwidthform","uniqueId":5097,"displayName":"Match full/half width form","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to check or uncheck the corresponding UI option in the \"Japanese Find\" dialog.  The \"Japanese Find\" dialog may be accessed from the Find dialog, under Home tab | Editing | Find | Go To... | Search Options | Options....  It could also be found under the Navigation Pane, under Home tab | Editing | Find | < down arrow > | Options... | Sounds Like (Japanese) | Options.  The \"Sounds like (Japanese)\" checkbox and the \"Options...\" button may be hidden in Word until certain editing languages are enabled.\n\nIf you enable this policy setting, you will check the corresponding UI option as specified in this policy setting's title.\n\nIf you disable or do not configure this policy setting, the corresponding UI option will be unchecked.\n","supportedPlatforms":["Windows"],"tags":["Japanese Find","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpreffuz","registrySubPath":"feqbyte_1_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Matchhiraganakatakana","uniqueId":5098,"displayName":"Match hiragana/katakana","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to check or uncheck the corresponding UI option in the \"Japanese Find\" dialog.  The \"Japanese Find\" dialog may be accessed from the Find dialog, under Home tab | Editing | Find | Go To... | Search Options | Options....  It could also be found under the Navigation Pane, under Home tab | Editing | Find | < down arrow > | Options... | Sounds Like (Japanese) | Options.  The \"Sounds like (Japanese)\" checkbox and the \"Options...\" button may be hidden in Word until certain editing languages are enabled.\n\nIf you enable this policy setting, you will check the corresponding UI option as specified in this policy setting's title.\n\nIf you disable or do not configure this policy setting, the corresponding UI option will be unchecked.\n","supportedPlatforms":["Windows"],"tags":["Japanese Find","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpreffuz","registrySubPath":"feqhira_kata_3_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Matchhyuiyubyuvyu","uniqueId":5108,"displayName":"Match hyu/iyu, byu/vyu","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to check or uncheck the corresponding UI option in the \"Japanese Find\" dialog.  The \"Japanese Find\" dialog may be accessed from the Find dialog, under Home tab | Editing | Find | Go To... | Search Options | Options....  It could also be found under the Navigation Pane, under Home tab | Editing | Find | < down arrow > | Options... | Sounds Like (Japanese) | Options.  The \"Sounds like (Japanese)\" checkbox and the \"Options...\" button may be hidden in Word until certain editing languages are enabled.\n\nIf you enable this policy setting, you will check the corresponding UI option as specified in this policy setting's title.\n\nIf you disable or do not configure this policy setting, the corresponding UI option will be unchecked.\n","supportedPlatforms":["Windows"],"tags":["Japanese Find","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpreffuz","registrySubPath":"feqf_h_15_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Matchiaiyapianopiyano","uniqueId":5110,"displayName":"Match ia/iya (piano/piyano)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to check or uncheck the corresponding UI option in the \"Japanese Find\" dialog.  The \"Japanese Find\" dialog may be accessed from the Find dialog, under Home tab | Editing | Find | Go To... | Search Options | Options....  It could also be found under the Navigation Pane, under Home tab | Editing | Find | < down arrow > | Options... | Sounds Like (Japanese) | Options.  The \"Sounds like (Japanese)\" checkbox and the \"Options...\" button may be hidden in Word until certain editing languages are enabled.\n\nIf you enable this policy setting, you will check the corresponding UI option as specified in this policy setting's title.\n\nIf you disable or do not configure this policy setting, the corresponding UI option will be unchecked.\n","supportedPlatforms":["Windows"],"tags":["Japanese Find","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpreffuz","registrySubPath":"feqy_a_12_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Matchkikutekisutotekusuto","uniqueId":5111,"displayName":"Match ki/ku (tekisuto/tekusuto)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to check or uncheck the corresponding UI option in the \"Japanese Find\" dialog.  The \"Japanese Find\" dialog may be accessed from the Find dialog, under Home tab | Editing | Find | Go To... | Search Options | Options....  It could also be found under the Navigation Pane, under Home tab | Editing | Find | < down arrow > | Options... | Sounds Like (Japanese) | Options.  The \"Sounds like (Japanese)\" checkbox and the \"Options...\" button may be hidden in Word until certain editing languages are enabled.\n\nIf you enable this policy setting, you will check the corresponding UI option as specified in this policy setting's title.\n\nIf you disable or do not configure this policy setting, the corresponding UI option will be unchecked.\n","supportedPlatforms":["Windows"],"tags":["Japanese Find","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpreffuz","registrySubPath":"feqki_ku_14_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Matchminusdashchoon","uniqueId":5100,"displayName":"Match minus/dash/cho-on","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to check or uncheck the corresponding UI option in the \"Japanese Find\" dialog.  The \"Japanese Find\" dialog may be accessed from the Find dialog, under Home tab | Editing | Find | Go To... | Search Options | Options....  It could also be found under the Navigation Pane, under Home tab | Editing | Find | < down arrow > | Options... | Sounds Like (Japanese) | Options.  The \"Sounds like (Japanese)\" checkbox and the \"Options...\" button may be hidden in Word until certain editing languages are enabled.\n\nIf you enable this policy setting, you will check the corresponding UI option as specified in this policy setting's title.\n\nIf you disable or do not configure this policy setting, the corresponding UI option will be unchecked.\n","supportedPlatforms":["Windows"],"tags":["Japanese Find","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpreffuz","registrySubPath":"feqminus_2_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Matcholdkanaforms","uniqueId":5103,"displayName":"Match old kana forms","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to check or uncheck the corresponding UI option in the \"Japanese Find\" dialog.  The \"Japanese Find\" dialog may be accessed from the Find dialog, under Home tab | Editing | Find | Go To... | Search Options | Options....  It could also be found under the Navigation Pane, under Home tab | Editing | Find | < down arrow > | Options... | Sounds Like (Japanese) | Options.  The \"Sounds like (Japanese)\" checkbox and the \"Options...\" button may be hidden in Word until certain editing languages are enabled.\n\nIf you enable this policy setting, you will check the corresponding UI option as specified in this policy setting's title.\n\nIf you disable or do not configure this policy setting, the corresponding UI option will be unchecked.\n","supportedPlatforms":["Windows"],"tags":["Japanese Find","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpreffuz","registrySubPath":"feqoldkana_6_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Matchparentheses","uniqueId":4786,"displayName":"Match parentheses","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to set the option \"Match opening and closing parentheses\" in Word Options | Proofing | AutoCorrect Options... | AutoFormat As You Type | Automatically as you type. This option may be hidden in Word until certain editing languages are enabled.\n\nIf you enable this policy setting, \"Match opening and closing parentheses\" will be set.\n\nIf you disable or do not configure this policy setting, \"Match opening and closing parentheses\" will not be set.","supportedPlatforms":["Windows"],"tags":["Automatically as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"fautopair_144_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Matchrepeatcharactermarks","uniqueId":5101,"displayName":"Match 'repeat character' marks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to check or uncheck the corresponding UI option in the \"Japanese Find\" dialog.  The \"Japanese Find\" dialog may be accessed from the Find dialog, under Home tab | Editing | Find | Go To... | Search Options | Options....  It could also be found under the Navigation Pane, under Home tab | Editing | Find | < down arrow > | Options... | Sounds Like (Japanese) | Options.  The \"Sounds like (Japanese)\" checkbox and the \"Options...\" button may be hidden in Word until certain editing languages are enabled.\n\nIf you enable this policy setting, you will check the corresponding UI option as specified in this policy setting's title.\n\nIf you disable or do not configure this policy setting, the corresponding UI option will be unchecked.\n","supportedPlatforms":["Windows"],"tags":["Japanese Find","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpreffuz","registrySubPath":"feqrepsymbol_5_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Matchseshezeje","uniqueId":5109,"displayName":"Match se/she, ze/je","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to check or uncheck the corresponding UI option in the \"Japanese Find\" dialog.  The \"Japanese Find\" dialog may be accessed from the Find dialog, under Home tab | Editing | Find | Go To... | Search Options | Options....  It could also be found under the Navigation Pane, under Home tab | Editing | Find | < down arrow > | Options... | Sounds Like (Japanese) | Options.  The \"Sounds like (Japanese)\" checkbox and the \"Options...\" button may be hidden in Word until certain editing languages are enabled.\n\nIf you enable this policy setting, you will check the corresponding UI option as specified in this policy setting's title.\n\nIf you disable or do not configure this policy setting, the corresponding UI option will be unchecked.\n","supportedPlatforms":["Windows"],"tags":["Japanese Find","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpreffuz","registrySubPath":"feqs_sh_13_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Matchtsithichidhizi","uniqueId":5107,"displayName":"Match tsi/thi/chi, dhi/zi","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to check or uncheck the corresponding UI option in the \"Japanese Find\" dialog.  The \"Japanese Find\" dialog may be accessed from the Find dialog, under Home tab | Editing | Find | Go To... | Search Options | Options....  It could also be found under the Navigation Pane, under Home tab | Editing | Find | < down arrow > | Options... | Sounds Like (Japanese) | Options.  The \"Sounds like (Japanese)\" checkbox and the \"Options...\" button may be hidden in Word until certain editing languages are enabled.\n\nIf you enable this policy setting, you will check the corresponding UI option as specified in this policy setting's title.\n\nIf you disable or do not configure this policy setting, the corresponding UI option will be unchecked.\n","supportedPlatforms":["Windows"],"tags":["Japanese Find","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpreffuz","registrySubPath":"feqt_c_10_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Matchvariantformkanjiitaiji","uniqueId":5102,"displayName":"Match variant-form kanji (itaiji)","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to check or uncheck the corresponding UI option in the \"Japanese Find\" dialog.  The \"Japanese Find\" dialog may be accessed from the Find dialog, under Home tab | Editing | Find | Go To... | Search Options | Options....  It could also be found under the Navigation Pane, under Home tab | Editing | Find | < down arrow > | Options... | Sounds Like (Japanese) | Options.  The \"Sounds like (Japanese)\" checkbox and the \"Options...\" button may be hidden in Word until certain editing languages are enabled.\n\nIf you enable this policy setting, you will check the corresponding UI option as specified in this policy setting's title.\n\nIf you disable or do not configure this policy setting, the corresponding UI option will be unchecked.\n","supportedPlatforms":["Windows"],"tags":["Japanese Find","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vpreffuz","registrySubPath":"feqkanji_16_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Measurementunits","uniqueId":4855,"displayName":"Show measurements in units of","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Measurementunits;L_Selectunits","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Selects the default measurement unit for the horizontal ruler and for measurements in dialog boxes.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Measurementunits;L_Selectunits","uniqueId":4854,"displayName":"Select units: ","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Inches","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Centimeters","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Millimeters","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Points","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Picas","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Selects the default measurement unit for the horizontal ruler and for measurements in dialog boxes.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"measurementunits","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_MergeformattingwhenpastingfromPowerPoint","uniqueId":4902,"displayName":"Merge formatting when pasting from PowerPoint","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Smart cut and paste","Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"formatpowerpointpaste","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Mergepastedlistswithsurroundinglists","uniqueId":4904,"displayName":"Merge pasted lists with surrounding lists","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Smart cut and paste","Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"pastemergelists","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Monthnames","uniqueId":4897,"displayName":"Month names","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Monthnames;L_monthnames17","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Used for complex scripts. Specifies if month names shall be of calendar type Gregorian Arabic, Gregorian transliterated English, or Gregorian transliterated French.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Monthnames;L_monthnames17","uniqueId":4896,"displayName":"Month names","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"English transliterated","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"French transliterated","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Used for complex scripts. Specifies if month names shall be of calendar type Gregorian Arabic, Gregorian transliterated English, or Gregorian transliterated French.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"aradate","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Movement","uniqueId":4828,"displayName":"Cursor movement","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Movement;L_movement4","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Used for complex scripts. Specifies if logical or visual cursor control shall be used.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Movement;L_movement4","uniqueId":4827,"displayName":"Cursor movement","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Logical","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Visual","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Used for complex scripts. Specifies if logical or visual cursor control shall be used.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"cursormovement","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Numeral","uniqueId":4895,"displayName":"Numeral","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Numeral;L_numeral16","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Used for complex scripts. Specifies if numerals shall be displayed as Arabic, Hindi, Context, or System numerals. ","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Numeral;L_numeral16","uniqueId":4894,"displayName":"Numeral","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Arabic","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Hindi","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Context","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"System","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Used for complex scripts. Specifies if numerals shall be displayed as Arabic, Hindi, Context, or System numerals. ","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"numform","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Objectanchors","uniqueId":4806,"displayName":"Object anchors","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Display","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"showanchors","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_OfficeFileBlockIncludeTrustedFiles","uniqueId":5400,"displayName":"File Block includes trusted files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"description":"This policy setting controls whether File Block settings for a file type apply to Trusted Files of the same file type.\n\nIf you enable this policy setting, Trusted Files will have to follow what the File Block setting is for the given file type.\n\nIf you disable or do not configure this policy setting, Trusted Files will not follow the File Block setting for the given file type.","supportedPlatforms":["Windows"],"tags":["OfficeFileBlockIncludeTrustedFiles","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\fileblock","registrySubPath":"IncludeTrustedFiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_OfficeOpenXMLConvertersForWord","uniqueId":4981,"displayName":"Office Open XML converters for Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_OfficeOpenXMLConvertersForWord;L_OfficeOpenXMLConvertersForWordDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_OfficeOpenXMLConvertersForWord;L_OfficeOpenXMLConvertersForWordDropID","uniqueId":4980,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\fileblock","registrySubPath":"ooxmlconverters","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_OnlineVideos","uniqueId":5169,"displayName":"Allow Online Videos to play within Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether online videos can be played within Word.\n\nIf you enable or do not configure this policy, users will be able to play online videos within Word.\n\nIf you disable this policy setting, you will not be able to play online videos within Word.\n      ","supportedPlatforms":["Windows"],"tags":["General","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"onlinevideo","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Openattachmentsforfullscreenreading;L_ChecktoallowstartinginReadingLayout","uniqueId":4737,"displayName":"Check to allow starting in Reading Layout","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["General","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"allowautoreadingmode","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Openattachmentsforfullscreenreading","uniqueId":4738,"displayName":"Open e-mail attachments in Reading View","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Openattachmentsforfullscreenreading;L_ChecktoallowstartinginReadingLayout","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["General","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_OpenDocumentTextFiles","uniqueId":4953,"displayName":"OpenDocument Text files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_OpenDocumentTextFiles;L_OpenDocumentTextFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_OpenDocumentTextFiles;L_OpenDocumentTextFilesDropID","uniqueId":4952,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\fileblock","registrySubPath":"opendocumenttext","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_OpenFilesOnLocalIntranetUNCInProtectedView","uniqueId":5084,"displayName":"Open files on local Intranet UNC in Protected View","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting lets you determine if files on local Intranet UNC file shares open in Protected View.\n\nIf you enable this policy setting, files on local Intranet UNC file shares open in Protected View if their UNC paths appear to be within the internet zone.\n\nIf you disable or do not configure this policy setting, files on Intranet UNC file shares do not open in Protected View if their UNC paths appear to be within the internet zone.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\protectedview","registrySubPath":"disableintranetcheck","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Optionalbreaks","uniqueId":4805,"displayName":"Optional breaks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Determines whether the symbol used to represent optional breaks is shown on the screen.","supportedPlatforms":["Windows"],"tags":["Display","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"showoptbreaks","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Optionalhyphens","uniqueId":4804,"displayName":"Optional hyphens","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Determines whether the symbol used to represent optional hyphens is shown on the screen.","supportedPlatforms":["Windows"],"tags":["Display","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"showcondhyphens","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Ordinals1stwithsuperscript","uniqueId":4773,"displayName":"Ordinals (1st) with superscript","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Replace as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"fnumsupscript_104_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Paragraphmarks","uniqueId":4803,"displayName":"Paragraph marks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Determines whether the symbol used to represent the end of paragraphs is shown on the screen.","supportedPlatforms":["Windows"],"tags":["Display","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"showparamarks","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_PersonalTemplatesPath","uniqueId":5161,"displayName":"Personal templates path for Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_PersonalTemplatesPath;L_PersonalTemplatesPath","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the location of a user's personal templates. \n\nIf you enable this policy setting, users will see any templates they have saved in the specified location in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will change to be the specified location. \n\nIf you disable or do not configure this policy setting, users will not see templates they have saved in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will be their document save location.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_PersonalTemplatesPath;L_PersonalTemplatesPath","uniqueId":5160,"displayName":"Personal templates path for Word","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting specifies the location of a user's personal templates. \n\nIf you enable this policy setting, users will see any templates they have saved in the specified location in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will change to be the specified location. \n\nIf you disable or do not configure this policy setting, users will not see templates they have saved in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will be their document save location.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"personaltemplates","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_Pictureplaceholders","uniqueId":4839,"displayName":"Show picture placeholders","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"showpictureplaceholders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_PlainTextFiles","uniqueId":4977,"displayName":"Plain text files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_PlainTextFiles;L_PlainTextFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_PlainTextFiles;L_PlainTextFilesDropID","uniqueId":4976,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\fileblock","registrySubPath":"textfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_PreventCoAuthoring","uniqueId":5142,"displayName":"Prevent co-authoring","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls how Word opens a file for editing on document management servers that support co-authoring.\n\nIf you enable this policy setting, Word will prevent co-authoring by taking an exclusive file lock. \n\nIf you disable or do not configure this policy setting, Word will allow co-authoring by taking short-term shared locks. \n\nNote: When file synchronization via SOAP over HTTP is turned off it will prevent co-authoring.","supportedPlatforms":["Windows"],"tags":["Co-authoring","Collaboration Settings","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\coauthoring","registrySubPath":"disablecoauthoring","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_PromptBeforeSavingNormalTemplate","uniqueId":4893,"displayName":"Prompt before saving Normal template","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"promptsavenormal","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Prompttoupdatestyle","uniqueId":4825,"displayName":"Prompt to update style","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"promptupdatestyle","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Providefeedbackwithanimation","uniqueId":4873,"displayName":"Provide feedback with animation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"animatescreenmove","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Recentlyusedfilelist;L_Numberofentries","uniqueId":4852,"displayName":"Number of entries: ","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":50},"dataType":"Integer"},"description":"This policy setting specifies the number of entries displayed in the Recent Documents list that appears when users click Open on the File tab in Backstage view.\n\nIf you enable this policy setting, you can specify the number of entries to be between 0 and 50. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 25 items will be displayed in the Recent Documents list.\n\nNote: If you want to prevent items from being added to the Recent Documents list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\file mru","registrySubPath":"max display","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Recentlyusedfilelist","uniqueId":4853,"displayName":"Number of documents in the Recent Documents list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Recentlyusedfilelist;L_Numberofentries","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the number of entries displayed in the Recent Documents list that appears when users click Open on the File tab in Backstage view.\n\nIf you enable this policy setting, you can specify the number of entries to be between 0 and 50. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 25 items will be displayed in the Recent Documents list.\n\nNote: If you want to prevent items from being added to the Recent Documents list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_RelyonCSSforfontformatting","uniqueId":4882,"displayName":"Rely on CSS for font formatting","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to configure the \"Use Cascading Style Sheets (CSS) for appearance of messages\" option found under Microsoft Outlook's File tab | Outlook Options | Mail | Message format.\n\nIf you enable this policy setting, the option is checked.\n\nIf you disable or do not configure this policy setting, the option is not checked.\n","supportedPlatforms":["Windows"],"tags":["E-mail Options","Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\mailsettings","registrySubPath":"usecssinhtml","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Replacetextasyoutype","uniqueId":4769,"displayName":"Replace text as you type","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["AutoCorrect","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"fcorrecttyping_16_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_RequirethatApplicationExtensionsaresigned","uniqueId":4946,"displayName":"Require that application add-ins are signed by Trusted Publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting controls whether add-ins for this applications must be digitally signed by a trusted publisher.\n \nIf you enable this policy setting, this application checks the digital signature for each add-in before loading it. If an add-in does not have a digital signature, or if the signature did not come from a trusted publisher, this application disables the add-in and notifies the user. Certificates must be added to the Trusted Publishers list if you require that all add-ins be signed by a trusted publisher. For detail on about obtaining and distributing certificates, see http://go.microsoft.com/fwlink/?LinkId=294922. Office 2016 stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store.  Office 2016 still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store. Therefore, if you created a list of trusted publishers in a previous version of Office and you upgrade to Office 2016, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store. For more information about trusted publishers, see the Office Resource Kit.\n\nIf you disable or do not configure this policy setting, this application does not check the digital signature on application add-ins before opening them. If a dangerous add-in is loaded, it could harm users' computers or compromise data security.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security","registrySubPath":"requireaddinsig","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Reverseprintorder","uniqueId":4866,"displayName":"Print pages in reverse order","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vprsu","registrySubPath":"reverseprint_6_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_RTFFiles","uniqueId":4975,"displayName":"RTF files","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_RTFFiles;L_RTFFilesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_RTFFiles;L_RTFFilesDropID","uniqueId":4974,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\fileblock","registrySubPath":"rtffiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_SaveAutoRecoverinfo","uniqueId":4810,"displayName":"Save AutoRecover info","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_SaveAutoRecoverinfo;L_SaveAutoRecoverinfoeveryminutes","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"If you enable this policy setting, you can specify the number of minutes that Word will wait between saving AutoRecover information for the file. To prevent Word from ever saving AutoRecover information for the file, enable this policy and set the value to '0'.\n\nIf you disable or do not configure this policy setting, this policy will have no effect on the number of minutes that Word will wait between saving AutoRecover information for the file. By default, Word saves AutoRecover information for the file every 10 minutes.","supportedPlatforms":["Windows"],"tags":["Save","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_SaveAutoRecoverinfo;L_SaveAutoRecoverinfoeveryminutes","uniqueId":4809,"displayName":"Save AutoRecover info every (minutes)","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":120},"dataType":"Integer"},"description":"If you enable this policy setting, you can specify the number of minutes that Word will wait between saving AutoRecover information for the file. To prevent Word from ever saving AutoRecover information for the file, enable this policy and set the value to '0'.\n\nIf you disable or do not configure this policy setting, this policy will have no effect on the number of minutes that Word will wait between saving AutoRecover information for the file. By default, Word saves AutoRecover information for the file every 10 minutes.","supportedPlatforms":["Windows"],"tags":["Save","Word Options","Microsoft Word 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"autosaveinterval","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_SaveWordfilesas","uniqueId":4815,"displayName":"Default file format","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_SaveWordfilesas;L_savewordfilesas3","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting determines the default file format for saving files in Word.\n\nIf you enable this policy setting, you can set the default file format from among the following options: \n\n- Word Document (*.docx): This option is the default configuration in Word.\n- Single Files Web Page (*.mht)\n- Web Page (*.htm; *.html)\n- Web Page, Filtered (*.htm, *.html)\n- Rich Text Format (*.rtf)\n- Plain Text  (*.txt)\n- Word 6.0/95 (*.doc)\n- Word 6.0/95 - Chinese (Simplified) (*.doc)\n- Word 6.0/95 - Chinese (Traditional) (*.doc)\n- Word 6.0/95 - Japanese (*.doc)\n- Word 6.0/95 - Korean (*.doc)\n- Word 97-2002 and 6.0/95 - RTF\n- Word 5.1 for Macintosh (*.mcw)\n- Word 5.0 for Macintosh (*.mcw)\n- Word 2.x for Windows (*.doc)\n- Works 4.0 for Windows (*.wps)\n- WordPerfect 5.x for Windows (*.doc)\n- WordPerfect 5.1 for DOS (*.doc)\n- Word Macro-Enabled Document (*.docm)\n- Word Template (*.dotx)\n- Word Macro-Enabled Template (*.dotm)\n- Word 97 - 2003 Document (*.doc)\n- Word 97 - 2003 Template (*.dot)\n- Word XML Document (*.xml)\n- Strict Open XML Document (*.docx)\n- OpenDocument Text (*.odt)\n\nUsers can choose to save presentations or documents in a different file format than the default.\n\nIf you disable or do not configure this policy setting, Word saves new files in the Office Open XML format: Word files have a .docx extension. For users who run recent versions of Word, Microsoft offers the Microsoft Office Compatibility Pack, which enables them to open and save Office Open XML files. If some users in your organization cannot install the Compatibility Pack, or are running versions of Word older than Microsoft Office 2000 with Service Pack 3, they might not be able to access Office Open XML files.\n\nThis policy setting is often set in combination with the \"Save As Open XML in Compatibility Mode\" policy setting.","supportedPlatforms":["Windows"],"tags":["Save","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_SaveWordfilesas;L_savewordfilesas3","uniqueId":4814,"displayName":"Save Word files as","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Word Document (*.docx)","description":"","tags":[],"dependencyGroup":null},{"value":"WebArchive","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Single Files Web Page (*.mht)","description":"","tags":[],"dependencyGroup":null},{"value":"HTML","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Web Page (*.htm; *.html)","description":"","tags":[],"dependencyGroup":null},{"value":"ReducedHTML","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Web Page, Filtered (*.htm, *.html)","description":"","tags":[],"dependencyGroup":null},{"value":"Rtf","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Rich Text Format (*.rtf)","description":"","tags":[],"dependencyGroup":null},{"value":"Text","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Plain Text  (*.txt)","description":"","tags":[],"dependencyGroup":null},{"value":"MSWord6Exp","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Word 6.0/95 (*.doc)","description":"","tags":[],"dependencyGroup":null},{"value":"MSWord6SCExp","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Word 6.0/95 - Chinese (Simplified) (*.doc)","description":"","tags":[],"dependencyGroup":null},{"value":"MSWord6TCExp","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Word 6.0/95 - Chinese (Traditional) (*.doc)","description":"","tags":[],"dependencyGroup":null},{"value":"MSWord6JExp","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Word 6.0/95 - Japanese (*.doc)","description":"","tags":[],"dependencyGroup":null},{"value":"MSWord95KExp","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Word 6.0/95 - Korean (*.doc)","description":"","tags":[],"dependencyGroup":null},{"value":"MSWord6RTFExp","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Word 97-2002 & 6.0/95 - RTF","description":"","tags":[],"dependencyGroup":null},{"value":"MSWordMac51","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Word 5.1 for Macintosh (*.mcw)","description":"","tags":[],"dependencyGroup":null},{"value":"MSWordMac5","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Word 5.0 for Macintosh (*.mcw)","description":"","tags":[],"dependencyGroup":null},{"value":"MSWordWin2","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Word 2.x for Windows (*.doc)","description":"","tags":[],"dependencyGroup":null},{"value":"MSWorksWin4","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Works 4.0 for Windows (*.wps)","description":"","tags":[],"dependencyGroup":null},{"value":"WrdPrfctWin","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"WordPerfect 5.x for Windows (*.doc)","description":"","tags":[],"dependencyGroup":null},{"value":"WrdPrfctDos51","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"WordPerfect 5.1 for DOS (*.doc)","description":"","tags":[],"dependencyGroup":null},{"value":"MacroEnabledDocument","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Word Macro-Enabled Document (*.docm)","description":"","tags":[],"dependencyGroup":null},{"value":"Template","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Word Template (*.dotx)","description":"","tags":[],"dependencyGroup":null},{"value":"MacroEnabledTemplate","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Word Macro-Enabled Template (*.dotm)","description":"","tags":[],"dependencyGroup":null},{"value":"Doc","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Word 97 - 2003 Document (*.doc)","description":"","tags":[],"dependencyGroup":null},{"value":"Dot","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Word 97 - 2003 Template (*.dot)","description":"","tags":[],"dependencyGroup":null},{"value":"FlatXML","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Word XML Document (*.xml)","description":"","tags":[],"dependencyGroup":null},{"value":"DocxStrict","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Strict Open XML Document (*.docx)","description":"","tags":[],"dependencyGroup":null},{"value":"ODT","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"OpenDocument Text (*.odt)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"","description":"This policy setting determines the default file format for saving files in Word.\n\nIf you enable this policy setting, you can set the default file format from among the following options: \n\n- Word Document (*.docx): This option is the default configuration in Word.\n- Single Files Web Page (*.mht)\n- Web Page (*.htm; *.html)\n- Web Page, Filtered (*.htm, *.html)\n- Rich Text Format (*.rtf)\n- Plain Text  (*.txt)\n- Word 6.0/95 (*.doc)\n- Word 6.0/95 - Chinese (Simplified) (*.doc)\n- Word 6.0/95 - Chinese (Traditional) (*.doc)\n- Word 6.0/95 - Japanese (*.doc)\n- Word 6.0/95 - Korean (*.doc)\n- Word 97-2002 and 6.0/95 - RTF\n- Word 5.1 for Macintosh (*.mcw)\n- Word 5.0 for Macintosh (*.mcw)\n- Word 2.x for Windows (*.doc)\n- Works 4.0 for Windows (*.wps)\n- WordPerfect 5.x for Windows (*.doc)\n- WordPerfect 5.1 for DOS (*.doc)\n- Word Macro-Enabled Document (*.docm)\n- Word Template (*.dotx)\n- Word Macro-Enabled Template (*.dotm)\n- Word 97 - 2003 Document (*.doc)\n- Word 97 - 2003 Template (*.dot)\n- Word XML Document (*.xml)\n- Strict Open XML Document (*.docx)\n- OpenDocument Text (*.odt)\n\nUsers can choose to save presentations or documents in a different file format than the default.\n\nIf you disable or do not configure this policy setting, Word saves new files in the Office Open XML format: Word files have a .docx extension. For users who run recent versions of Word, Microsoft offers the Microsoft Office Compatibility Pack, which enables them to open and save Office Open XML files. If some users in your organization cannot install the Compatibility Pack, or are running versions of Word older than Microsoft Office 2000 with Service Pack 3, they might not be able to access Office Open XML files.\n\nThis policy setting is often set in combination with the \"Save As Open XML in Compatibility Mode\" policy setting.","supportedPlatforms":["Windows"],"tags":["Save","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"defaultformat","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_ScreenTips","uniqueId":4794,"displayName":"Show document tooltips on hover","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Determines whether the symbol used to represent Screen Tips are shown in the document.","supportedPlatforms":["Windows"],"tags":["Display","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"showscreentips","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_SendToKindle","uniqueId":5401,"displayName":"Turn off Send to Kindle","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy allows you to control the availability of the Send to Kindle feature. This feature allows users to send their Word documents directly from Word to their Kindle device or Kindle app. The feature is available by default.\n\nIf you enable this policy setting, Send to Kindle won’t be available to users.\n\nIf you disable or don’t configure this policy setting, Send to Kindle will be available to users.\n\nFor more information, see https://go.microsoft.com/fwlink/?linkid=2219846.","supportedPlatforms":["Windows","Mac","Web"],"tags":["SendToKindle","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"SendToKindle","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_SetCNGCipherAlgorithm","uniqueId":4912,"displayName":"Set CNG cipher algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_SetCNGCipherAlgorithm;L_SetCNGCipherAlgorithmID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the CNG cipher algorithm that is used.\n\nIf you enable this policy setting, then the cipher provided will be used if it is a supported algorithm.\n\nIf you disable or do not configure this policy setting, AES will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_SetCNGCipherAlgorithm;L_SetCNGCipherAlgorithmID","uniqueId":4911,"displayName":"CNG cipher algorithm:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to configure the CNG cipher algorithm that is used.\n\nIf you enable this policy setting, then the cipher provided will be used if it is a supported algorithm.\n\nIf you disable or do not configure this policy setting, AES will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Word Options","Microsoft Word 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\crypto","registrySubPath":"cipheralgorithm","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_SetCNGCipherKeyLength","uniqueId":4916,"displayName":"Set CNG cipher key length","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_SetCNGCipherKeyLength;L_SetCNGCipherKeyLengthSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the number of bits to use when creating the cipher key.  This number will be rounded down to a multiple of 8.\n\nIf you enable this policy setting, the key bits specified will be used.\n\nIf you disable or do not configure this policy setting, the default value will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_SetCNGCipherKeyLength;L_SetCNGCipherKeyLengthSpinID","uniqueId":4915,"displayName":"Cipher key length","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":1000000},"dataType":"Integer"},"defaultValue":"","description":"This policy setting allows you to configure the number of bits to use when creating the cipher key.  This number will be rounded down to a multiple of 8.\n\nIf you enable this policy setting, the key bits specified will be used.\n\nIf you disable or do not configure this policy setting, the default value will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Word Options","Microsoft Word 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\crypto","registrySubPath":"cipherkeybits","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_SetCNGPasswordSpinCount","uniqueId":4925,"displayName":"Set CNG password spin count","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_SetCNGPasswordSpinCount;L_SetCNGPasswordSpinCountSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the number of times to spin (rehash) the password verifier.\n\nIf you enable this policy setting, the number specified will be the number of times the password will be rehashed.\n\nIf you disable or do not configure this policy setting, the default (100000) will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_SetCNGPasswordSpinCount;L_SetCNGPasswordSpinCountSpinID","uniqueId":4924,"displayName":"Set CNG password spin count","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":10000000},"dataType":"Integer"},"defaultValue":"100000","description":"This policy setting allows you to specify the number of times to spin (rehash) the password verifier.\n\nIf you enable this policy setting, the number specified will be the number of times the password will be rehashed.\n\nIf you disable or do not configure this policy setting, the default (100000) will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Word Options","Microsoft Word 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\crypto","registrySubPath":"passwordspincount","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_SetDefaultCompatibilityModeOnFileCreation","uniqueId":4813,"displayName":"Set default compatibility mode on file creation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_SetDefaultCompatibilityModeOnFileCreation;L_SetDefaultCompatibilityModeOnFileCreationDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the default compatibility mode when creating new files in Word. There are four modes:\n\n1. Word 2003: This mode disables features in Word that are not compatible with Word 2003.\n2. Word 2007: This mode disables features in Word that are not compatible with Word 2007.\n3. Word 2010: This mode disables features in Word that are not compatible with Word 2010.\n4. Full functionality mode: This mode ensures that all new features remain enabled. This is the default setting for Word. \n\nNote: Not all file formats support all four Compatibility Modes. Open XML file formats such as .docx and .dotx, support all four modes.","supportedPlatforms":["Windows"],"tags":["Save","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_SetDefaultCompatibilityModeOnFileCreation;L_SetDefaultCompatibilityModeOnFileCreationDropID","uniqueId":4812,"displayName":"Set default compatibility mode on file creation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":11,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Word 2003","description":"","tags":[],"dependencyGroup":null},{"value":12,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Word 2007","description":"","tags":[],"dependencyGroup":null},{"value":14,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Word 2010","description":"","tags":[],"dependencyGroup":null},{"value":15,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Full functionality mode","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":15,"description":"This policy setting allows you to specify the default compatibility mode when creating new files in Word. There are four modes:\n\n1. Word 2003: This mode disables features in Word that are not compatible with Word 2003.\n2. Word 2007: This mode disables features in Word that are not compatible with Word 2007.\n3. Word 2010: This mode disables features in Word that are not compatible with Word 2010.\n4. Full functionality mode: This mode ensures that all new features remain enabled. This is the default setting for Word. \n\nNote: Not all file formats support all four Compatibility Modes. Open XML file formats such as .docx and .dotx, support all four modes.","supportedPlatforms":["Windows"],"tags":["Save","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"compatmode","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_SetDefaultFileBlockBehavior","uniqueId":4949,"displayName":"Set default file block behavior","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_SetDefaultFileBlockBehavior;L_SetDefaultFileBlockBehaviorDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine if users can open, view, or edit Word files.\n\nIf you enable this policy setting, you can set one of these options:\n- Blocked files are not opened\n- Blocked files open in Protected View and can not be edited\n- Blocked files open in Protected View and can be edited\n\nIf you disable or do not configure this policy setting, users will be able to open blocked files, but not edit them.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_SetDefaultFileBlockBehavior;L_SetDefaultFileBlockBehaviorDropID","uniqueId":4948,"displayName":"Set default file block behavior","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Blocked files are not opened","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Blocked files open in Protected View and can not be edited","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Blocked files open in Protected View and can be edited","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine if users can open, view, or edit Word files.\n\nIf you enable this policy setting, you can set one of these options:\n- Blocked files are not opened\n- Blocked files open in Protected View and can not be edited\n- Blocked files open in Protected View and can be edited\n\nIf you disable or do not configure this policy setting, users will be able to open blocked files, but not edit them.","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\fileblock","registrySubPath":"openinprotectedview","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_SetDocumentBehaviorIfFileValidationFails","uniqueId":5090,"displayName":"Set document behavior if file validation fails","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_SetDocumentBehaviorIfFileValidationFails;L_SetDocumentBehaviorIfFileValidationFailsDropID","logicalOperator":"exists","values":null},{"dependee":"word16;L_SetDocumentBehaviorIfFileValidationFails;L_SetDocumentBehaviorIfFileValidationFailsStr3","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls how Office handles documents when they fail file validation. \n\nIf you enable this policy setting, you can configure the following options for files that fail file validation:\n\n- Block files completely. Users cannot open the files.\n- Open files in Protected View and disallow edit. Users cannot edit the files. This is also how Office handles the files if you disable this policy setting.\n- Open files in Protected View and allow edit. Users can edit the files. This is also how Office handles the files if you do not configure this policy setting.\n\nIf you disable this policy setting, Office follows the \"Open files in Protected View and disallow edit\" behavior.\n\nIf you do not configure this policy setting, Office follows the \"Open files in Protected View and allow edit\" behavior.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_SetDocumentBehaviorIfFileValidationFails;L_SetDocumentBehaviorIfFileValidationFailsDropID","uniqueId":5088,"displayName":"Set document behavior if file validation fails","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block files","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":1,"description":"This policy setting controls how Office handles documents when they fail file validation. \n\nIf you enable this policy setting, you can configure the following options for files that fail file validation:\n\n- Block files completely. Users cannot open the files.\n- Open files in Protected View and disallow edit. Users cannot edit the files. This is also how Office handles the files if you disable this policy setting.\n- Open files in Protected View and allow edit. Users can edit the files. This is also how Office handles the files if you do not configure this policy setting.\n\nIf you disable this policy setting, Office follows the \"Open files in Protected View and disallow edit\" behavior.\n\nIf you do not configure this policy setting, Office follows the \"Open files in Protected View and allow edit\" behavior.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\filevalidation","registrySubPath":"openinprotectedview","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_SetDocumentBehaviorIfFileValidationFails;L_SetDocumentBehaviorIfFileValidationFailsStr3","uniqueId":5089,"displayName":"Checked: Allow edit.  Unchecked: Do not allow edit.","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":1,"description":"This policy setting controls how Office handles documents when they fail file validation. \n\nIf you enable this policy setting, you can configure the following options for files that fail file validation:\n\n- Block files completely. Users cannot open the files.\n- Open files in Protected View and disallow edit. Users cannot edit the files. This is also how Office handles the files if you disable this policy setting.\n- Open files in Protected View and allow edit. Users can edit the files. This is also how Office handles the files if you do not configure this policy setting.\n\nIf you disable this policy setting, Office follows the \"Open files in Protected View and disallow edit\" behavior.\n\nIf you do not configure this policy setting, Office follows the \"Open files in Protected View and allow edit\" behavior.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\filevalidation","registrySubPath":"disableeditfrompv","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Setleftindentontabsandbackspace","uniqueId":4788,"displayName":"Set left indent on tabs and backspace","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Automatically as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"ftabindent_128_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_SetMaximumNumberOfTrustedDocuments","uniqueId":4933,"displayName":"Set maximum number of trusted documents","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_SetMaximumNumberOfTrustedDocuments;L_SetMaximumNumberOfTrustedDocumentsSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the maximum number of trust records for trusted documents that can be stored in the registry before the purge task runs. The purge task reduces the number of trusted documents stored in the registry to the value set by the \"Set maximum number of trust records to preserve\" policy setting.\n\nIf you enable this policy setting, you can specify the maximum number of trusted documents to be stored in the registry before the purge task runs, with an upper limit of 20,000 documents. For performance reasons, we do not recommend setting this policy setting to the upper limit.\n\nIf you disable or do not configure this policy setting, the default value of 500 is used for the maximum number of trusted documents that can be stored in the registry before the purge task runs.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_SetMaximumNumberOfTrustedDocuments;L_SetMaximumNumberOfTrustedDocumentsSpinID","uniqueId":4932,"displayName":"Maximum number:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":20000},"dataType":"Integer"},"defaultValue":"500","description":"This policy setting allows you to specify the maximum number of trust records for trusted documents that can be stored in the registry before the purge task runs. The purge task reduces the number of trusted documents stored in the registry to the value set by the \"Set maximum number of trust records to preserve\" policy setting.\n\nIf you enable this policy setting, you can specify the maximum number of trusted documents to be stored in the registry before the purge task runs, with an upper limit of 20,000 documents. For performance reasons, we do not recommend setting this policy setting to the upper limit.\n\nIf you disable or do not configure this policy setting, the default value of 500 is used for the maximum number of trusted documents that can be stored in the registry before the purge task runs.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted documents","registrySubPath":"maxtrusteddocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_SetMaximumNumberOfTrustRecordsToPreserve","uniqueId":4935,"displayName":"Set maximum number of trust records to preserve","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_SetMaximumNumberOfTrustRecordsToPreserve;L_SetMaximumNumberOfTrustRecordsToPreserveSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the maximum number of trust records to preserve when the purge task detects that this application has trusted more than the number of trusted documents set by the \"Set maximum number of trusted documents\" policy setting.\n\nIf you enable this policy setting, you may specify the maximum number of trust records to preserve, with an upper limit of 20000.  Due to performance reasons, it is not recommended to set it to the upper limit.\n\nIf you disable or you do not configure this policy setting, the default value for of 400 is used.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_SetMaximumNumberOfTrustRecordsToPreserve;L_SetMaximumNumberOfTrustRecordsToPreserveSpinID","uniqueId":4934,"displayName":"Maximum to preserve:","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":20000},"dataType":"Integer"},"defaultValue":"400","description":"This policy setting allows you to specify the maximum number of trust records to preserve when the purge task detects that this application has trusted more than the number of trusted documents set by the \"Set maximum number of trusted documents\" policy setting.\n\nIf you enable this policy setting, you may specify the maximum number of trust records to preserve, with an upper limit of 20000.  Due to performance reasons, it is not recommended to set it to the upper limit.\n\nIf you disable or you do not configure this policy setting, the default value for of 400 is used.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted documents","registrySubPath":"maxpreservetrusteddocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_SetNumberOfPlacesInTheRecentPlacesList","uniqueId":4818,"displayName":"Number of folders in the Recent Folders list","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_SetNumberOfPlacesInTheRecentPlacesList;L_SetNumberOfPlacesInTheRecentPlacesListSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting specifies the number of unpinned entries displayed in the Recent Folders list that appears when users click Open or Save As on the File tab in Backstage view.\n\nIf you enable this policy setting, you can specify the number of unpinned entries to be between 0 and 20. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 5 unpinned items are displayed in the Recent Folders list.\n\nNote: If you want to prevent items from being added to the Recent Folders list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_SetNumberOfPlacesInTheRecentPlacesList;L_SetNumberOfPlacesInTheRecentPlacesListSpinID","uniqueId":4817,"displayName":"Number of folders in the Recent Folders list","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":20},"dataType":"Integer"},"defaultValue":"5","description":"This policy setting specifies the number of unpinned entries displayed in the Recent Folders list that appears when users click Open or Save As on the File tab in Backstage view.\n\nIf you enable this policy setting, you can specify the number of unpinned entries to be between 0 and 20. If you set the number to 0, all pinned and unpinned entries are hidden.\n\nIf you disable or do not configure this policy setting, a maximum of 5 unpinned items are displayed in the Recent Folders list.\n\nNote: If you want to prevent items from being added to the Recent Folders list entirely, you can enable the \"Do not keep history of recently opened documents\" Windows policy setting.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\place mru","registrySubPath":"max display","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_SetParametersForCNGContext","uniqueId":4920,"displayName":"Set parameters for CNG context","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_SetParametersForCNGContext;L_SetParametersForCNGContextID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the encryption parameters that should be used for the CNG context. \n\nIf you enable this policy setting, the parameters specified will be passed to the CNG context.\n\nIf you disable or do not configure this policy setting, the default CNG values will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_SetParametersForCNGContext;L_SetParametersForCNGContextID","uniqueId":4919,"displayName":"Parameters","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to specify the encryption parameters that should be used for the CNG context. \n\nIf you enable this policy setting, the parameters specified will be passed to the CNG context.\n\nIf you disable or do not configure this policy setting, the default CNG values will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Word Options","Microsoft Word 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\crypto","registrySubPath":"context","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_ShowAgreementsRibbon","uniqueId":5185,"displayName":"Show Agreements Ribbon","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Control Access to the Agreements Ribbon in Word.\nThis policy setting allows you to control who in your organization can see the Agreements ribbon in Word and leverage the capabilities to create and manage the agreements lifecycle in Word.\n\nIf you enable this policy setting, you can configure groups of users who will see the Agreements ribbon.\n\nIf you disable this policy setting, the Agreements ribbon will not be available to users in your organization.\n\nIf you do not set this policy setting, the Agreements ribbon will not be available to users in your organization.","supportedPlatforms":["Windows","Mac","Web"],"tags":["Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows","Mac"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"showagreementsribbon","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_ShowESignRibbon","uniqueId":5186,"displayName":"Allow the use of eSignature for Microsoft Word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to control whether users can request eSignatures directly from Word in tenants that have enabled Microsoft's native eSignature service.\n\nIf you enable this policy setting, users can request eSignatures from within Word. This policy setting applies only to subscription versions of Word.\n\nIf you disable this policy setting, users cannot request eSignatures from within Word.\n\nIf you don't configure this policy setting, users cannot request eSignatures from within Word.","supportedPlatforms":["Windows"],"tags":["Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"isesignenabled","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_ShowPeople","uniqueId":5163,"displayName":"Show pictures in comments","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting determines whether or not comments show pictures.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"revmodeshowpeople","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_ShowpixelsforHTMLfeatures","uniqueId":4859,"displayName":"Show pixels for HTML features","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"pixelsindialogs","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Showreadabilitystatistics","uniqueId":4758,"displayName":"Show readability statistics","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"showstats","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Smartstylebehavior","uniqueId":4901,"displayName":"Smart style behavior","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Smart cut and paste","Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"smartstylepaste","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Spaces","uniqueId":4802,"displayName":"Spaces","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Determines whether the symbol used to represent spaces is shown on the screen.","supportedPlatforms":["Windows"],"tags":["Display","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"showspaces","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_SpecifyCNGHashAlgorithm","uniqueId":4922,"displayName":"Specify CNG hash algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_SpecifyCNGHashAlgorithm;L_SpecifyCNGHashAlgorithmDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the hash algorithm used.\n\nIf you enable this policy setting, the hashing algorithm selected will be used by CNG.\n\nIf you disable or do not configure this policy setting, the default CNG hash algorithm will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_SpecifyCNGHashAlgorithm;L_SpecifyCNGHashAlgorithmDropID","uniqueId":4921,"displayName":"Specify CNG hash algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":"SHA1","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA1","description":"","tags":[],"dependencyGroup":null},{"value":"SHA256","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA256","description":"","tags":[],"dependencyGroup":null},{"value":"SHA384","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA384","description":"","tags":[],"dependencyGroup":null},{"value":"SHA512","firstOfficeVersion":"","lastOfficeVersion":"","displayName":"SHA512","description":"","tags":[],"dependencyGroup":null}]},"dataType":"String"},"defaultValue":"SHA256","description":"This policy setting allows you to specify the hash algorithm used.\n\nIf you enable this policy setting, the hashing algorithm selected will be used by CNG.\n\nIf you disable or do not configure this policy setting, the default CNG hash algorithm will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\crypto","registrySubPath":"hashalgorithm","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_SpecifyCNGRandomNumberGeneratorAlgorithm","uniqueId":4927,"displayName":"Specify CNG random number generator algorithm","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_SpecifyCNGRandomNumberGeneratorAlgorithm;L_SpecifyCNGRandomNumberGeneratorAlgorithmID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure the CNG random number generator to use.\n\nIf you enable this policy setting, the random number generator specified will be used.\n\nIf you disable or do not configure this policy setting, the default random number generator will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_SpecifyCNGRandomNumberGeneratorAlgorithm;L_SpecifyCNGRandomNumberGeneratorAlgorithmID","uniqueId":4926,"displayName":"Random number generator:","settingType":{"possibleValues":{"possibleValuesType":"Regex","regex":"^(?!\\s*$).+","validationFailErrorText":"A non-empty value is required."},"dataType":"String"},"description":"This policy setting allows you to configure the CNG random number generator to use.\n\nIf you enable this policy setting, the random number generator specified will be used.\n\nIf you disable or do not configure this policy setting, the default random number generator will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Word Options","Microsoft Word 2016","Cloud Policies Regex","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\crypto","registrySubPath":"rngalgorithm","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_SpecifyCNGSaltLength","uniqueId":4929,"displayName":"Specify CNG salt length","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_SpecifyCNGSaltLength;L_SpecifyCNGSaltLengthSpinID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the number of bytes of salt that should be used.\n\nIf you enable this policy setting, the bytes specified will be used.\n\nIf you disable or do not configure this policy setting, the default length of 16 will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_SpecifyCNGSaltLength;L_SpecifyCNGSaltLengthSpinID","uniqueId":4928,"displayName":"Number of bytes","settingType":{"possibleValues":{"possibleValuesType":"IntegerRange","minimum":0,"maximum":5000},"dataType":"Integer"},"defaultValue":"16","description":"This policy setting allows you to specify the number of bytes of salt that should be used.\n\nIf you enable this policy setting, the bytes specified will be used.\n\nIf you disable or do not configure this policy setting, the default length of 16 will be used.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Word Options","Microsoft Word 2016","Cloud Policies Range","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\crypto","registrySubPath":"saltbytes","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_SpecifyEncryptionCompatibility","uniqueId":4918,"displayName":"Specify encryption compatibility","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_SpecifyEncryptionCompatibility;L_SpecifyEncryptionCompatibilityDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify the encrypted database compatibility.\n\nIf you enable this policy setting, the compatibility format specified will be applied during encryption for new files\n- Use legacy format\n- Use next generation format\n- All files save with next generation format\n\nIf you disable or do not configure this policy setting, the default setting, \"Use next generation format,\" will be applied.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_SpecifyEncryptionCompatibility;L_SpecifyEncryptionCompatibilityDropID","uniqueId":4917,"displayName":"Specify encryption compatibility","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use legacy format","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use next generation format","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"All files save with next generation format","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":2,"description":"This policy setting allows you to specify the encrypted database compatibility.\n\nIf you enable this policy setting, the compatibility format specified will be applied during encryption for new files\n- Use legacy format\n- Use next generation format\n- All files save with next generation format\n\nIf you disable or do not configure this policy setting, the default setting, \"Use next generation format,\" will be applied.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\crypto","registrySubPath":"compatmode","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_StartupBoostOption","uniqueId":5187,"displayName":"Allow Startup Boost feature","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting configures the \"Startup Boost\" checkbox found under File tab | Options | General. Startup Boost improves Word's boot time by prewarming the app on user login.\n\nIf you enable or do not configure this policy, users will be able to use the Startup Boost feature. The Startup Boost checkbox will be enabled and checked by default.\n\nIf you disable this policy setting, the Startup Boost feature will not be available. The Startup Boost checkbox will be disabled and unchecked.\n\nNote: This policy setting only applies to subscription versions of Office, such as Microsoft 365 Apps for enterprise.\n      ","supportedPlatforms":["Windows"],"tags":["General","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"prewarmadminallowed","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Startup","uniqueId":4892,"displayName":"Startup","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Startup;L_startup15","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines the default path to Word's Startup folder.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Startup;L_startup15","uniqueId":4891,"displayName":"Startup","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Defines the default path to Word's Startup folder.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"startup-path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_StopCheckingAltTextAccessibilityInformation","uniqueId":4719,"displayName":"Stop checking for alt text accessibility information","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that objects such as images and shapes contain alt text.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that objects such as images and shapes contain alt text.\n\nIf you disable or do not configure this policy setting, objects will be checked for alternative text and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\accchecker","registrySubPath":"alttext","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_StopCheckingBlankCharactersUsedForFormatting","uniqueId":4731,"displayName":"Stop checking whether blank characters are used for formatting","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from checking to ensure that multiple consecutive whitespace characters have not been used for formatting.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from checking to ensure that multiple consecutive whitespace characters have not been used for formatting.\n\nIf you disable or do not configure this policy setting, documents will be checked for consecutive whitespace usage and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\accchecker","registrySubPath":"blankcharacters","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_StopCheckingDocumentsAllowProgrammaticAccess","uniqueId":4726,"displayName":"Stop checking to ensure documents allow programmatic access","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from checking to ensure that documents have not blocked programmatic access through DRM.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from checking to ensure that documents have not blocked programmatic access through DRM.\n\nIf you disable or do not configure this policy setting, documents will be checked for programmatic access and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\accchecker","registrySubPath":"programmaticaccess","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_StopCheckingForBlankTableRowsAndColumns","uniqueId":4724,"displayName":"Stop checking for blank table rows and columns","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that blank rows and columns have not been inserted into tables.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that blank rows and columns have not been inserted into tables.\n\nIf you disable or do not configure this policy setting, tables will be checked for blank rows and columns and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\accchecker","registrySubPath":"blanktablecells","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_StopCheckingForImageWatermarks","uniqueId":4732,"displayName":"Stop checking for image watermarks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from checking if a document has image watermarks.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from checking if a document has image watermarks.\n\nIf you disable or do not configure this policy setting, documents will be checked for watermarks and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\accchecker","registrySubPath":"imagewatermarks","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_StopCheckingForMergedAndSplitCells","uniqueId":4725,"displayName":"Stop checking for merged and split cells","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that tables do not have merged or split cells.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that tables do not have merged or split cells.\n\nIf you disable or do not configure this policy setting, tables will be checked for merged and split cells and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\accchecker","registrySubPath":"2dtablestructure","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_StopCheckingForTablesUsedForLayout","uniqueId":4734,"displayName":"Stop checking for tables used for layout","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from flagging layout tables (i.e. tables with no style applied).\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from flagging layout tables (i.e. tables with no style applied).\n\nIf you disable or do not configure this policy setting, tables with no style will be flagged and the violations will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\accchecker","registrySubPath":"layouttablesreadingorder","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_StopCheckingHeadingStylesDoNotSkipStyleLevel","uniqueId":4733,"displayName":"Stop checking to ensure heading styles do not skip style level","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from checking to ensure that headings in a document are used in order.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from checking to ensure that headings in a document are used in order.\n\nIf you disable or do not configure this policy setting, the ordering of headings in a document will be checked and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\accchecker","registrySubPath":"headingorder","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_StopCheckingLongDocumentsUseStylesForStructure","uniqueId":4727,"displayName":"Stop checking to ensure long documents use styles for structure","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from checking to ensure that long documents have used styles to define content structure.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from checking to ensure that long documents have used styles to define content structure.\n\nIf you disable or do not configure this policy setting, documents will be checked for style usage and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\accchecker","registrySubPath":"stylesasstructure","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_StopCheckingStylesUsedFrequently","uniqueId":4728,"displayName":"Stop checking to ensure styles have been used frequently","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from checking to ensure that documents using styles have used them frequently enough to accurately represent the document's content structure.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from checking to ensure that documents using styles have used them frequently enough to accurately represent the document's content structure.\n\nIf you disable or do not configure this policy setting, the frequency of style usage will be checked and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\accchecker","registrySubPath":"headingspacing","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_StopCheckingTableAltTextAccessibilityInformation","uniqueId":4720,"displayName":"Stop checking for table alt text accessibility information","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that tables contain alt text.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that tables contain alt text.\n\nIf you disable or do not configure this policy setting, tables will be checked for alternative text and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\accchecker","registrySubPath":"tablealttext","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_StopCheckingTableHeaderAccessibilityInformation","uniqueId":4723,"displayName":"Stop checking for table header accessibility information","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that tables have a header row specified.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that tables have a header row specified.\n\nIf you disable or do not configure this policy setting, tables will be checked for header rows and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\accchecker","registrySubPath":"tableheaders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_StopCheckingToEnsureHeadingsAreSuccinct","uniqueId":4729,"displayName":"Stop checking to ensure headings are succinct","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from checking to ensure that headings in a document are succinct.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from checking to ensure that headings in a document are succinct.\n\nIf you disable or do not configure this policy setting, document headings will be checked for length and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\accchecker","registrySubPath":"succinctheadings","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_StopCheckingToEnsureHyperlinkTextIsMeaningfulText","uniqueId":4721,"displayName":"Stop checking to ensure hyperlink text is meaningful","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that hyperlinks have meaningful text.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that hyperlinks have meaningful text.\n\nIf you disable or do not configure this policy setting, hyperlink text will be checked and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\accchecker","registrySubPath":"meaningfulhyperlinkstext","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_StopCheckingToEnsureHyperlinkTextIsMeaningfulTextExtension","uniqueId":4722,"displayName":"Stop checking to ensure hyperlink text extension is meaningful if they include extensions","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from verifying that hyperlinks have meaningful text if they include extensions.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from verifying that hyperlinks have meaningful text if they include extensions.\n\nIf you disable or do not configure this policy setting, hyperlink text that include extensions will be checked and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\accchecker","registrySubPath":"meaningfulhyperlinkstextextension","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_StopCheckingWhetherObjectsAreFloating","uniqueId":4730,"displayName":"Stop checking whether objects are floating","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"accessibilitybaseline"}],"description":"This policy setting prevents the Accessibility Checker from checking if a document has objects that are floating instead of inline.\n\nIf you enable this policy setting, the Accessibility Checker will be prevented from checking if a document has objects that are floating instead of inline.\n\nIf you disable or do not configure this policy setting, objects will be checked for floating text wrapping properties and any issues will appear in the Accessibility Checker.","supportedPlatforms":["Windows"],"tags":["Check Accessibility","File Tab","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\accchecker","registrySubPath":"floatingobjects","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_StopReadAloudEyesOffExperience","uniqueId":5184,"displayName":"Stop Read Aloud when app goes in background","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy prevents Read Aloud from reading text when app goes in background.\n\nIf you enable this policy setting, Read Aloud will be disabled and will stop reading the text when app is sent to background.\n\nIf you disable or do not configure this policy setting, Read Aloud will continue reading the text when app moves to background and user will be able to control Read Aloud via notification.","supportedPlatforms":["Windows"],"tags":["Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"stopreadaloudeyesoffexperience","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Storerandomnumbertoimprovemergeaccuracy","uniqueId":5093,"displayName":"Store random number to improve merge accuracy","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"dontsaversid","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Straightquoteswithsmartquotes","uniqueId":4772,"displayName":"Straight quotes with smart quotes","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Replace as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"fsmartquote_8_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Styleareawidth","uniqueId":4857,"displayName":"Style area pane width in Draft and Outline views","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Styleareawidth;L_styleareawidth8","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to set the width of the style area that shows the names of applied styles to the side of document text.\n\nIf you enable this policy setting, you may specify the width of the style area.\n\nIf you disable or do not configure this policy setting, the default width is used.\n","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Styleareawidth;L_styleareawidth8","uniqueId":4856,"displayName":"Style area pane width in Draft and Outline views","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"0''","description":"","tags":[],"dependencyGroup":null},{"value":24,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"0.25''","description":"","tags":[],"dependencyGroup":null},{"value":48,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"0.5''","description":"","tags":[],"dependencyGroup":null},{"value":72,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"0.75''","description":"","tags":[],"dependencyGroup":null},{"value":96,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1''","description":"","tags":[],"dependencyGroup":null},{"value":120,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1.25''","description":"","tags":[],"dependencyGroup":null},{"value":144,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1.5''","description":"","tags":[],"dependencyGroup":null},{"value":168,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"1.75''","description":"","tags":[],"dependencyGroup":null},{"value":192,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"2''","description":"","tags":[],"dependencyGroup":null},{"value":216,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"2.25''","description":"","tags":[],"dependencyGroup":null},{"value":240,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"2.5''","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to set the width of the style area that shows the names of applied styles to the side of document text.\n\nIf you enable this policy setting, you may specify the width of the style area.\n\nIf you disable or do not configure this policy setting, the default width is used.\n","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"selbar","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Symbolcharacterswithsymbols","uniqueId":4775,"displayName":"Symbol characters (--) with symbols","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the option ''Hyphens (--) with dash (-)''.","supportedPlatforms":["Windows"],"tags":["Replace as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"femdash_112_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Tabcharacters","uniqueId":4801,"displayName":"Tab characters","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Determines whether the symbol used to represent tabs is shown on the screen.","supportedPlatforms":["Windows"],"tags":["Display","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"showtabs","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Tablecomparecolors","uniqueId":4753,"displayName":"Table compare colors","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Tablecomparecolors;L_TablecomparecolorsPart1","logicalOperator":"exists","values":null},{"dependee":"word16;L_Tablecomparecolors;L_TablecomparecolorsPart2","logicalOperator":"exists","values":null},{"dependee":"word16;L_Tablecomparecolors;L_TablecomparecolorsPart3","logicalOperator":"exists","values":null},{"dependee":"word16;L_Tablecomparecolors;L_TablecomparecolorsPart4","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This option determines the colors used for displaying the results of compared tables.  Selecting ''none'' will track the changes, but they will not be colored in the resulting document (they will be listed in the reviewing pane).","supportedPlatforms":["Windows"],"tags":["Track changes and compare","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Tablecomparecolors;L_TablecomparecolorsPart1","uniqueId":4749,"displayName":"Color for inserted cells:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"None","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"By Author","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Pink","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light blue","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light yellow","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light purple","description":"","tags":[],"dependencyGroup":null},{"value":6,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light Orange","description":"","tags":[],"dependencyGroup":null},{"value":7,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light green","description":"","tags":[],"dependencyGroup":null},{"value":8,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gray","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This option determines the colors used for displaying the results of compared tables.  Selecting ''none'' will track the changes, but they will not be colored in the resulting document (they will be listed in the reviewing pane).","supportedPlatforms":["Windows"],"tags":["Track changes and compare","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"revmodeinscellcolor","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Tablecomparecolors;L_TablecomparecolorsPart2","uniqueId":4750,"displayName":"Color for deleted cells:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"None","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"By Author","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Pink","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light blue","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light yellow","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light purple","description":"","tags":[],"dependencyGroup":null},{"value":6,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light Orange","description":"","tags":[],"dependencyGroup":null},{"value":7,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light green","description":"","tags":[],"dependencyGroup":null},{"value":8,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gray","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This option determines the colors used for displaying the results of compared tables.  Selecting ''none'' will track the changes, but they will not be colored in the resulting document (they will be listed in the reviewing pane).","supportedPlatforms":["Windows"],"tags":["Track changes and compare","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"revmodedelcellcolor","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Tablecomparecolors;L_TablecomparecolorsPart3","uniqueId":4751,"displayName":"Color for merged cells:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"None","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"By Author","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Pink","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light blue","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light yellow","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light purple","description":"","tags":[],"dependencyGroup":null},{"value":6,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light Orange","description":"","tags":[],"dependencyGroup":null},{"value":7,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light green","description":"","tags":[],"dependencyGroup":null},{"value":8,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gray","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This option determines the colors used for displaying the results of compared tables.  Selecting ''none'' will track the changes, but they will not be colored in the resulting document (they will be listed in the reviewing pane).","supportedPlatforms":["Windows"],"tags":["Track changes and compare","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"revmodemergecellcolor","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Tablecomparecolors;L_TablecomparecolorsPart4","uniqueId":4752,"displayName":"Color for split cells:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"None","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"By Author","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Pink","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light blue","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light yellow","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light purple","description":"","tags":[],"dependencyGroup":null},{"value":6,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light Orange","description":"","tags":[],"dependencyGroup":null},{"value":7,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Light green","description":"","tags":[],"dependencyGroup":null},{"value":8,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Gray","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":1,"description":"This option determines the colors used for displaying the results of compared tables.  Selecting ''none'' will track the changes, but they will not be colored in the resulting document (they will be listed in the reviewing pane).","supportedPlatforms":["Windows"],"tags":["Track changes and compare","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"revmodesplitcellcolor","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Tables","uniqueId":4780,"displayName":"Tables","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Apply as you type","AutoFormat as you type","Proofing","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\assist","registrySubPath":"ftable_392_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Textboundaries","uniqueId":4843,"displayName":"Show text boundaries","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"showtextboundaries","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_ToolsCompareandMergeDocumentsLegalblackline","uniqueId":5151,"displayName":"Tools | Compare and Merge Documents, Legal blackline","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"If you enable this policy setting, a comparison between two documents automatically generates a new Legal Blackline document, leaving the original documents unchanged.","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"defaulttocompare","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Tools","uniqueId":4890,"displayName":"Tools","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Tools;L_tools14","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Defines the default path to tools.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Tools;L_tools14","uniqueId":4889,"displayName":"Tools","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"Defines the default path to tools.","supportedPlatforms":["Windows"],"tags":["File Locations","Advanced","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"tools-path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_Translationdirection","uniqueId":5116,"displayName":"Translation direction","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Translationdirection;L_translationdirection96","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to set the default translation direction for Chinese text.\n\nIf you enable this policy setting, the selected option will check the corresponding checkbox in the \"Chinese Conversion\" dialog. This dialog is found in the Review tab | \"Convert with Options\" button. This may only be visible when Chinese is enabled as an editing language. \n\nIf you disable or do not configure this policy setting, either translation direction may be set.","supportedPlatforms":["Windows"],"tags":["Chinese Conversion | Convert with Options","Review Tab","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Translationdirection;L_translationdirection96","uniqueId":5115,"displayName":"Translation direction","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":2052,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Traditional Chinese to Simplified Chinese","description":"","tags":[],"dependencyGroup":null},{"value":1028,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Simplified Chinese to Traditional Chinese","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":2052,"description":"This policy setting allows you to set the default translation direction for Chinese text.\n\nIf you enable this policy setting, the selected option will check the corresponding checkbox in the \"Chinese Conversion\" dialog. This dialog is found in the Review tab | \"Convert with Options\" button. This may only be visible when Chinese is enabled as an editing language. \n\nIf you disable or do not configure this policy setting, either translation direction may be set.","supportedPlatforms":["Windows"],"tags":["Chinese Conversion | Convert with Options","Review Tab","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\shared tools\\proofing tools\\tcsc translator","registrySubPath":"translationtarget","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustaccesstoVisualBasicProject","uniqueId":4944,"displayName":"Trust access to Visual Basic Project","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls whether automation clients such as Microsoft Visual Studio 2005 Tools for Microsoft Office (VSTO) can access the Visual Basic for Applications project system in the specified applications. VSTO projects require access to the Visual Basic for Applications project system in Excel, PowerPoint, and Word, even though the projects do not use Visual Basic for Applications. Design-time support of controls in both Visual Basic and C# projects depends on the Visual Basic for Applications project system in Word and Excel.\n\nIf you enable this policy setting, VSTO and other automation clients can access the Visual Basic for Applications project system in the specified applications. Users will not be able to change this behavior through the \"Trust access to the VBA project object model\" user interface option under the Macro Settings section of the Trust Center.\n\nIf you disable this policy setting, VSTO does not have programmatic access to VBA projects. In addition, the \"Trust access to the VBA project object model\" check box is cleared and users cannot change it.  Note: Disabling this policy setting prevents VSTO projects from interacting properly with the VBA project system in the selected application.\n\nIf you do not configure this policy setting, automation clients do not have programmatic access to VBA projects. Users can enable this by selecting the \"Trust access to the VBA project object model\" in the \"Macro Settings\" section of the Trust Center. However, doing so allows macros in any documents the user opens to access the core Visual Basic objects, methods, and properties, which represents a potential security hazard.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security","registrySubPath":"accessvbom","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc01;L_Allowsubfolders","uniqueId":4987,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location1","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc01;L_Datecolon","uniqueId":4985,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location1","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc01;L_Descriptioncolon","uniqueId":4986,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location1","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc01;L_Pathcolon","uniqueId":4984,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location1","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc01","uniqueId":4988,"displayName":"Trusted Location #1","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_TrustedLoc01;L_Pathcolon","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc01;L_Datecolon","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc01;L_Descriptioncolon","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc01;L_Allowsubfolders","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_TrustedLoc02;L_allowsubfolders23","uniqueId":4992,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location2","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc02;L_datecolon21","uniqueId":4990,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location2","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc02;L_descriptioncolon22","uniqueId":4991,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location2","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc02;L_pathcolon20","uniqueId":4989,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location2","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc02","uniqueId":4993,"displayName":"Trusted Location #2","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_TrustedLoc02;L_pathcolon20","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc02;L_datecolon21","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc02;L_descriptioncolon22","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc02;L_allowsubfolders23","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_TrustedLoc03;L_allowsubfolders27","uniqueId":4997,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location3","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc03;L_datecolon25","uniqueId":4995,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location3","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc03;L_descriptioncolon26","uniqueId":4996,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location3","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc03;L_pathcolon24","uniqueId":4994,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location3","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc03","uniqueId":4998,"displayName":"Trusted Location #3","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_TrustedLoc03;L_pathcolon24","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc03;L_datecolon25","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc03;L_descriptioncolon26","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc03;L_allowsubfolders27","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_TrustedLoc04;L_allowsubfolders31","uniqueId":5002,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location4","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc04;L_datecolon29","uniqueId":5000,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location4","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc04;L_descriptioncolon30","uniqueId":5001,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location4","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc04;L_pathcolon28","uniqueId":4999,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location4","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc04","uniqueId":5003,"displayName":"Trusted Location #4","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_TrustedLoc04;L_pathcolon28","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc04;L_datecolon29","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc04;L_descriptioncolon30","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc04;L_allowsubfolders31","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_TrustedLoc05;L_allowsubfolders35","uniqueId":5007,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location5","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc05;L_datecolon33","uniqueId":5005,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location5","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc05;L_descriptioncolon34","uniqueId":5006,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location5","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc05;L_pathcolon32","uniqueId":5004,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location5","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc05","uniqueId":5008,"displayName":"Trusted Location #5","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_TrustedLoc05;L_pathcolon32","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc05;L_datecolon33","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc05;L_descriptioncolon34","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc05;L_allowsubfolders35","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_TrustedLoc06;L_allowsubfolders39","uniqueId":5012,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location6","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc06;L_datecolon37","uniqueId":5010,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location6","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc06;L_descriptioncolon38","uniqueId":5011,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location6","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc06;L_pathcolon36","uniqueId":5009,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location6","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc06","uniqueId":5013,"displayName":"Trusted Location #6","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_TrustedLoc06;L_pathcolon36","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc06;L_datecolon37","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc06;L_descriptioncolon38","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc06;L_allowsubfolders39","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_TrustedLoc07;L_allowsubfolders43","uniqueId":5017,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location7","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc07;L_datecolon41","uniqueId":5015,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location7","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc07;L_descriptioncolon42","uniqueId":5016,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location7","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc07;L_pathcolon40","uniqueId":5014,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location7","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc07","uniqueId":5018,"displayName":"Trusted Location #7","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_TrustedLoc07;L_pathcolon40","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc07;L_datecolon41","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc07;L_descriptioncolon42","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc07;L_allowsubfolders43","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_TrustedLoc08;L_allowsubfolders47","uniqueId":5022,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location8","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc08;L_datecolon45","uniqueId":5020,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location8","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc08;L_descriptioncolon46","uniqueId":5021,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location8","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc08;L_pathcolon44","uniqueId":5019,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location8","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc08","uniqueId":5023,"displayName":"Trusted Location #8","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_TrustedLoc08;L_pathcolon44","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc08;L_datecolon45","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc08;L_descriptioncolon46","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc08;L_allowsubfolders47","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_TrustedLoc09;L_allowsubfolders51","uniqueId":5027,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location9","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc09;L_datecolon49","uniqueId":5025,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location9","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc09;L_descriptioncolon50","uniqueId":5026,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location9","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc09;L_pathcolon48","uniqueId":5024,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location9","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc09","uniqueId":5028,"displayName":"Trusted Location #9","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_TrustedLoc09;L_pathcolon48","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc09;L_datecolon49","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc09;L_descriptioncolon50","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc09;L_allowsubfolders51","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_TrustedLoc10;L_allowsubfolders55","uniqueId":5032,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location10","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc10;L_datecolon53","uniqueId":5030,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location10","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc10;L_descriptioncolon54","uniqueId":5031,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location10","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc10;L_pathcolon52","uniqueId":5029,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location10","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc10","uniqueId":5033,"displayName":"Trusted Location #10","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_TrustedLoc10;L_pathcolon52","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc10;L_datecolon53","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc10;L_descriptioncolon54","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc10;L_allowsubfolders55","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_TrustedLoc11;L_allowsubfolders59","uniqueId":5037,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location11","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc11;L_datecolon57","uniqueId":5035,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location11","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc11;L_descriptioncolon58","uniqueId":5036,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location11","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc11;L_pathcolon56","uniqueId":5034,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location11","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc11","uniqueId":5038,"displayName":"Trusted Location #11","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_TrustedLoc11;L_pathcolon56","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc11;L_datecolon57","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc11;L_descriptioncolon58","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc11;L_allowsubfolders59","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_TrustedLoc12;L_allowsubfolders63","uniqueId":5042,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location12","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc12;L_datecolon61","uniqueId":5040,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location12","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc12;L_descriptioncolon62","uniqueId":5041,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location12","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc12;L_pathcolon60","uniqueId":5039,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location12","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc12","uniqueId":5043,"displayName":"Trusted Location #12","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_TrustedLoc12;L_pathcolon60","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc12;L_datecolon61","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc12;L_descriptioncolon62","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc12;L_allowsubfolders63","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_TrustedLoc13;L_allowsubfolders67","uniqueId":5047,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location13","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc13;L_datecolon65","uniqueId":5045,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location13","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc13;L_descriptioncolon66","uniqueId":5046,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location13","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc13;L_pathcolon64","uniqueId":5044,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location13","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc13","uniqueId":5048,"displayName":"Trusted Location #13","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_TrustedLoc13;L_pathcolon64","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc13;L_datecolon65","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc13;L_descriptioncolon66","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc13;L_allowsubfolders67","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_TrustedLoc14;L_allowsubfolders71","uniqueId":5052,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location14","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc14;L_datecolon69","uniqueId":5050,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location14","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc14;L_descriptioncolon70","uniqueId":5051,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location14","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc14;L_pathcolon68","uniqueId":5049,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location14","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc14","uniqueId":5053,"displayName":"Trusted Location #14","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_TrustedLoc14;L_pathcolon68","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc14;L_datecolon69","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc14;L_descriptioncolon70","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc14;L_allowsubfolders71","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_TrustedLoc15;L_allowsubfolders75","uniqueId":5057,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location15","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc15;L_datecolon73","uniqueId":5055,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location15","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc15;L_descriptioncolon74","uniqueId":5056,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location15","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc15;L_pathcolon72","uniqueId":5054,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location15","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc15","uniqueId":5058,"displayName":"Trusted Location #15","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_TrustedLoc15;L_pathcolon72","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc15;L_datecolon73","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc15;L_descriptioncolon74","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc15;L_allowsubfolders75","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_TrustedLoc16;L_allowsubfolders79","uniqueId":5062,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location16","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc16;L_datecolon77","uniqueId":5060,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location16","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc16;L_descriptioncolon78","uniqueId":5061,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location16","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc16;L_pathcolon76","uniqueId":5059,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location16","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc16","uniqueId":5063,"displayName":"Trusted Location #16","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_TrustedLoc16;L_pathcolon76","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc16;L_datecolon77","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc16;L_descriptioncolon78","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc16;L_allowsubfolders79","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_TrustedLoc17;L_allowsubfolders83","uniqueId":5067,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location17","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc17;L_datecolon81","uniqueId":5065,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location17","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc17;L_descriptioncolon82","uniqueId":5066,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location17","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc17;L_pathcolon80","uniqueId":5064,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location17","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc17","uniqueId":5068,"displayName":"Trusted Location #17","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_TrustedLoc17;L_pathcolon80","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc17;L_datecolon81","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc17;L_descriptioncolon82","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc17;L_allowsubfolders83","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_TrustedLoc18;L_allowsubfolders87","uniqueId":5072,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location18","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc18;L_datecolon85","uniqueId":5070,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location18","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc18;L_descriptioncolon86","uniqueId":5071,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location18","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc18;L_pathcolon84","uniqueId":5069,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location18","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc18","uniqueId":5073,"displayName":"Trusted Location #18","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_TrustedLoc18;L_pathcolon84","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc18;L_datecolon85","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc18;L_descriptioncolon86","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc18;L_allowsubfolders87","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_TrustedLoc19;L_allowsubfolders91","uniqueId":5077,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location19","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc19;L_datecolon89","uniqueId":5075,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location19","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc19;L_descriptioncolon90","uniqueId":5076,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location19","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc19;L_pathcolon88","uniqueId":5074,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location19","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc19","uniqueId":5078,"displayName":"Trusted Location #19","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_TrustedLoc19;L_pathcolon88","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc19;L_datecolon89","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc19;L_descriptioncolon90","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc19;L_allowsubfolders91","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_TrustedLoc20;L_allowsubfolders95","uniqueId":5082,"displayName":"Allow sub folders:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location20","registrySubPath":"allowsubfolders","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc20;L_datecolon93","uniqueId":5080,"displayName":"Date:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location20","registrySubPath":"date","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc20;L_descriptioncolon94","uniqueId":5081,"displayName":"Description:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location20","registrySubPath":"description","registryType":"REG_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc20;L_pathcolon92","uniqueId":5079,"displayName":"Path:","settingType":{"possibleValues":{"possibleValuesType":"Unrestricted"},"dataType":"String"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Text","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted locations\\location20","registrySubPath":"path","registryType":"REG_EXPAND_SZ","registryHiveType":"User"}}},{"id":"word16;L_TrustedLoc20","uniqueId":5083,"displayName":"Trusted Location #20","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_TrustedLoc20;L_pathcolon92","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc20;L_datecolon93","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc20;L_descriptioncolon94","logicalOperator":"exists","values":null},{"dependee":"word16;L_TrustedLoc20;L_allowsubfolders95","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to specify a location that is used as a trusted source for opening files in this application.  Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.\n\nIf you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning.  If you check the \"Allow sub folders\" check box, then all sub-folders in the folder you specify will also be trusted.\n\nIf you disable or do not configure this policy setting, the trusted location is not specified.","supportedPlatforms":["Windows"],"tags":["Trusted Locations","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_TurnOffFileSynchronizationViaSOAPOverHTTP","uniqueId":5144,"displayName":"Turn off file synchronization via SOAP over HTTP","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls file synchronization via SOAP over HTTP for Word.\n\nIf you enable this policy setting, file synchronization via SOAP over HTTP is turned off for Word.\n\nIf you disable or do not configure this policy setting this policy setting, file synchronization via SOAP over HTTP is turned on for Word.\n\nNote: Turning off file synchronization via SOAP over HTTP will also prevent co-authoring and adversely affect the behavior of SharePoint Workspaces.","supportedPlatforms":["Windows"],"tags":["Server Settings","Miscellaneous","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\common\\internet","registrySubPath":"fsshttpoffword","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TurnOffFileValidation","uniqueId":5091,"displayName":"Turn off file validation","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":1,"recommendation":"security"}],"description":"This policy setting allows you turn off the file validation feature.\n\nIf you enable this policy setting, file validation will be turned off.\n\nIf you disable or do not configure this policy setting, file validation will be turned on.  Office Binary Documents (97-2003) are checked to see if they conform against the file format schema before they are opened.","supportedPlatforms":["Windows"],"tags":["Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\filevalidation","registrySubPath":"enableonload","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TurnOffProtectedViewForAttachmentsOpenedFromOutlook","uniqueId":5087,"displayName":"Turn off Protected View for attachments opened from Outlook","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"recommendedValues":[{"value":0,"recommendation":"security"}],"description":"This policy setting allows you to determine if Word files in Outlook attachments open in Protected View.\n\nIf you enable this policy setting, Outlook attachments do not open in Protected View.\n\nIf you disable or do not configure this policy setting, Outlook attachments open in Protected View.","supportedPlatforms":["Windows"],"tags":["Protected View","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\protectedview","registrySubPath":"disableattachmentsinpv","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TurnOffTrustedDocuments","uniqueId":4931,"displayName":"Turn off trusted documents","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off the trusted documents feature.  The trusted documents feature allows users to always enable active content in documents such as macros, ActiveX controls, data connections, etc. so that they are not prompted the next time they open the documents.  Trusted documents are exempt from security notifications.\n\nIf you enable this policy setting, you will turn off the trusted documents feature.  Users will receive a security prompt every time a document containing active content is opened.\n\nIf you disable or do not configure this policy setting, documents will be trusted when users enable content for a document, and users will not receive a security prompt.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted documents","registrySubPath":"disabletrusteddocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TurnOffTrustedDocumentsOnTheNetwork","uniqueId":4930,"displayName":"Turn off Trusted Documents on the network","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to turn off the trusted documents feature for documents opened from the network.\n\nIf you enable this policy setting, users will always see security notifications for active content such as macros, ActiveX controls, data connections, etc. for documents opened from the network.\n\nIf you disable or do not configure this policy setting, the trusted documents feature allows users to always allow active content in documents such as macros, ActiveX controls, data connections, etc. so that users are not prompted the next time they open the documents.  Trusted documents are exempt from security notifications.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\trusted documents","registrySubPath":"disablenetworktrusteddocuments","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_TypeAndReplace","uniqueId":4832,"displayName":"Type and replace","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to check or uncheck the \"Type and Replace\" checkbox found under File tab | Options | Advanced.  This checkbox may only be shown when certain South East Asian languages, such as Thai or Vietnamese, are enabled.\n\nSouth Asian languages follow stringent grammatical rules that dictate which textual character elements are allowed next to one another in the composition of words. To compound the complexity of correctly entering South Asian characters, text includes both simple characters and characters that include one or more markings such as diacritics, tone marks, vowels, and accents— for example, in Thai, leading vowels are normally followed by a consonant that does or does not include vowel markings, but diacritics are located below it.\n\nTo assist you in correctly entering characters in your document that prescribe to the grammar rules for the enabled South Asian language, Word can automatically check the text for you. Word can also make logical substitutions for you by using Type and Replace, a complementary feature.\n\nSequence checking can be used by itself or in combination with Type and Replace. When sequence checking only is selected, Word will not allow an invalid character to be typed at the insertion point. If Type and Replace is also selected, Word will insert or replace an existing character to make a valid sequence.\n\nIf you enable or do not configure this policy setting, the \"Type and Replace\" checkbox is checked.\n\nIf you disable this policy setting, the \"Type and Replace\" checkbox is unchecked.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"typenrepl","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Typingreplacesselection","uniqueId":4816,"displayName":"Typing replaces selected text","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"autotextdelete","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_UpdateautomaticlinksatOpen","uniqueId":4875,"displayName":"Update automatic links at Open","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"dontupdatelinks","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Updatefields","uniqueId":4798,"displayName":"Update fields before printing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to configure the \"Update fields before printing\" setting found under File tab | Options | Display | Printing options.\n\nIf you enable this policy setting, Word will update fields in the document before the document is printed.\n\nIf you disable or do not configure this policy setting, Word will not update fields in the document before the document is printed.","supportedPlatforms":["Windows"],"tags":["Display","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vprsu","registrySubPath":"refresh_5_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Updatelinks","uniqueId":4799,"displayName":"Update linked data before printing","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls the \"Update linked data before printing\" setting found under File tab | Options | Display | Printing options.\n\nIf you enable this policy setting, Word will update linked data in the document before the document is printed. One example of linked data in Word is an embedded Excel chart that is linked to an Excel spreadsheet.\n\nIf you disable or do not configure this policy setting, Word will not update linked data in the document before the document is printed.","supportedPlatforms":["Windows"],"tags":["Display","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options\\vprsu","registrySubPath":"updatelinks_13_1","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Usecharacterunits","uniqueId":4858,"displayName":"Show measurements in width of characters","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option. This option may be hidden in Word until certain editing languages are enabled.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"measurementinchars","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_UseCTRLClicktofollowhyperlink","uniqueId":4821,"displayName":"Use CTRL + Click to follow hyperlinks","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"ctrlclickhyperlink","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_UseNewKeyOnPasswordChange","uniqueId":4923,"displayName":"Use new key on password change","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to specify if a new encryption key is used when the password is changed.\n\nIf you enable or do not configure this policy setting, a new intermediate key is generated when the password is changed. This causes any extra key encryptors to be removed when the file is saved.\n\nIf you disable this policy setting, a new intermediate key is not generated when the password is changed.","supportedPlatforms":["Windows"],"tags":["Cryptography","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\crypto","registrySubPath":"newkeyonpwdchange","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Usesequencechecking","uniqueId":4831,"displayName":"Use sequence checking","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"seqcheck","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Usesmartparagraphselection","uniqueId":4823,"displayName":"Use smart paragraph selection","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting controls the \"Use smart paragraph selection\" option found under File tab | Options | Advanced | Editing options.\n\nIf you enable or do not configure this policy setting, Word will automatically select the paragraph mark at the end of a selected range of text.\n\nIf you disable this policy setting, Word will not automatically select the paragraph mark at the end of a selected range of text.  However, a user can still select the paragraph mark manually.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"smartparagraphselect","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_UseTaiwanHongKongSARandMacaoSARcharactervariants","uniqueId":5117,"displayName":"Use Taiwan, Hong Kong SAR and Macao SAR character variants","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"This policy setting allows you to configure the \"Chinese Conversion\" dialog, which is accessed by the \"Convert with Options\" button in the Review tab. This may only be visible when Chinese is enabled as an editing language.\n\nIf you enable this policy setting, the option is selected.\n\nIf you disable or do not configure this policy setting, the option is not selected.","supportedPlatforms":["Windows"],"tags":["Chinese Conversion | Convert with Options","Review Tab","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\shared tools\\proofing tools\\tcsc translator","registrySubPath":"usevariants","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_UsetheINSkeyforpaste","uniqueId":4837,"displayName":"Use the Insert key for paste","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"insforpaste","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_VBAWarningsPolicy;L_empty19","uniqueId":4937,"displayName":"VBA Macro Notification Settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable all with notification","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable all except digitally signed macros","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disable all without notification","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enable all macros (not recommended)","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":3,"recommendation":"security"}],"defaultValue":2,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n\nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security","registrySubPath":"vbawarnings","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_VBAWarningsPolicy;L_VBADigSigTrustedPublishersStr","uniqueId":4938,"displayName":"Require macros to be signed by a trusted publisher","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":1,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n\nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security","registrySubPath":"vbadigsigtrustedpublishers","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_VBAWarningsPolicy;L_VBAOnlyAllowDigSigWithCodeSigningEKUStr","uniqueId":4940,"displayName":"Require Extended Key Usage (EKU) for certificates from trusted publishers","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n\nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security","registrySubPath":"vbarequiredigsigwithcodesigningeku","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_VBAWarningsPolicy;L_VBAOnlyAllowLMTrustedPublisherStr","uniqueId":4939,"displayName":"Block certificates from trusted publishers that are only installed in the current user certificate store","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":0,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n\nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security","registrySubPath":"vbarequirelmtrustedpublisher","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_VBAWarningsPolicy","uniqueId":4941,"displayName":"VBA Macro Notification Settings","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_VBAWarningsPolicy;L_empty19","logicalOperator":"exists","values":null},{"dependee":"word16;L_VBAWarningsPolicy;L_VBADigSigTrustedPublishersStr","logicalOperator":"exists","values":null},{"dependee":"word16;L_VBAWarningsPolicy;L_VBAOnlyAllowLMTrustedPublisherStr","logicalOperator":"exists","values":null},{"dependee":"word16;L_VBAWarningsPolicy;L_VBAOnlyAllowDigSigWithCodeSigningEKUStr","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.\n\nIf you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:\n \n- Disable all with notification:  The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.\n \n- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.\n \n- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.\n \n- Enable all macros (not recommended):  All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.\n \nIf you disable this policy setting, \"Disable all with notification\" will be the default setting.\n \nIf you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking \"Enable Content\" on the Trust Bar.  If the user clicks \"Enable Content\", then the document is added as a trusted document.\n\nIf you select “Disable all except digitally signed macros” we recommend that you also select the “Require macros to be signed by a trusted publisher” check box to help improve security.\n\nIf you select the “Require macros to be signed by a trusted publisher” check box, users opening files with digitally signed macros but not by a Trusted Publisher will receive a notification that macros are blocked from running. And there are two additional check boxes that we recommend that you select to help improve security.\n\n- Block certificates from trusted publishers that are installed in the current user certificate store\n\n- Require Extended Key Usage (EKU) for certificates from trusted publishers\n\nNote: These two check boxes only apply if you have selected the \"Require macros to be signed by a trusted publisher\" check box.\n\nNote: All three check boxes only apply to Version 2012 and later of Office and Visio. They don’t apply to Office 2016 or Office 2019.\n\nIf you select the “Block certificates from trusted publishers that are installed in the local machine certificate store” check box, macros won’t run if the certificate from the trusted publisher is installed in the current user certificate store. The certificate must be installed in the local machine certificate store for the macro to run. Only accounts with administrator access to the computer can install a certificate in the local machine certificate store.\n\nIf you select the “Require Extended Key Usage (EKU) for certificates from trusted publishers” check box, the EKU must include “Code Signing” as one of the uses of the certificate.\n\nImportant: If \"Disable all except digitally signed macros\" is selected, users will not be able to open unsigned Access databases.\n \nAlso, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.\n \nTherefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.","supportedPlatforms":["Windows"],"tags":["Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_VerticalrulerPrintviewonly","uniqueId":4863,"displayName":"Show vertical ruler in Print Layout view","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"verticalruler","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Verticalscrollbar","uniqueId":4861,"displayName":"Show vertical scroll bar","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"verticalscrollbar","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Visualselection","uniqueId":4830,"displayName":"Cursor visual selection","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Visualselection;L_visualselection5","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies if Block or Continuous selection shall be used. Block selection parodies the selection behavior within the Windows explorer when files in a folder. You draw a rectangle with the curson, and everything inside the rectangle is selected.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Visualselection;L_visualselection5","uniqueId":4829,"displayName":"Cursor visual selection","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Continuous","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Specifies if Block or Continuous selection shall be used. Block selection parodies the selection behavior within the Windows explorer when files in a folder. You draw a rectangle with the curson, and everything inside the rectangle is selected.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"cursorselection","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Volumepreference","uniqueId":5146,"displayName":"Volume preference","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Volumepreference;L_volumepreference179","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to configure Microsoft Word to retain file path information when you work with files on a network server, either as a mapped drive (Z:\\Folder_Name\\File_Name) or as Universal Naming Convention (UNC) (\\\\Share_Name\\File_Name).\n\nIf you enable this policy setting, you may select one of these options:\n- Use Drive letter or UNC as entered\n- Convert Drive letter to UNC\n- Convert UNC to Drive letter\n\nIf you disable or do not configure this policy setting, the default option is \"Use Drive letter or UNC as entered.\"","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Volumepreference;L_volumepreference179","uniqueId":5145,"displayName":"Volume preference","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Use Drive letter or UNC as entered","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Convert Drive letter to UNC","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Convert UNC to Drive letter","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to configure Microsoft Word to retain file path information when you work with files on a network server, either as a mapped drive (Z:\\Folder_Name\\File_Name) or as Universal Naming Convention (UNC) (\\\\Share_Name\\File_Name).\n\nIf you enable this policy setting, you may select one of these options:\n- Use Drive letter or UNC as entered\n- Convert Drive letter to UNC\n- Convert UNC to Drive letter\n\nIf you disable or do not configure this policy setting, the default option is \"Use Drive letter or UNC as entered.\"","supportedPlatforms":["Windows"],"tags":["Miscellaneous","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"volumepref","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Warnbeforeprintingsavingorsendingafilethatcontainstrackedcha","uniqueId":5092,"displayName":"Warn before printing, saving or sending a file that contains tracked changes or comments","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Security","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"warnrevisions","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_WebPages","uniqueId":4973,"displayName":"Web pages","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_WebPages;L_WebPagesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_WebPages;L_WebPagesDropID","uniqueId":4972,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\fileblock","registrySubPath":"htmlfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Whenselectingautomaticallyselectentireword","uniqueId":4819,"displayName":"When selecting, automatically select entire word","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"autowordselect","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_WhitespacebetweenpagesPrintviewonly","uniqueId":4795,"displayName":"Show white space between pages in Print Layout view","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Determines whether the symbol used to represent white space between pages in Print view only is shown in the document.","supportedPlatforms":["Windows"],"tags":["Display","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"nomargpageview","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Word2000BinaryDocumentsAndTemplates","uniqueId":4963,"displayName":"Word 2000 binary documents and templates","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Word2000BinaryDocumentsAndTemplates;L_Word2000BinaryDocumentsAndTemplatesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Word2000BinaryDocumentsAndTemplates;L_Word2000BinaryDocumentsAndTemplatesDropID","uniqueId":4962,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\fileblock","registrySubPath":"word2000files","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Word2003AndPlainXMLDocuments","uniqueId":4959,"displayName":"Word 2003 and plain XML documents","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Word2003AndPlainXMLDocuments;L_Word2003AndPlainXMLDocumentsDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Word2003AndPlainXMLDocuments;L_Word2003AndPlainXMLDocumentsDropID","uniqueId":4958,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\fileblock","registrySubPath":"wordxmlfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Word2003BinaryDocumentsAndTemplates","uniqueId":4957,"displayName":"Word 2003 binary documents and templates","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Word2003BinaryDocumentsAndTemplates;L_Word2003BinaryDocumentsAndTemplatesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Word2003BinaryDocumentsAndTemplates;L_Word2003BinaryDocumentsAndTemplatesDropID","uniqueId":4956,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\fileblock","registrySubPath":"word2003files","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Word2007AndLaterBinaryDocumentsAndTemplates","uniqueId":4955,"displayName":"Word 2007 and later binary documents and templates","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Word2007AndLaterBinaryDocumentsAndTemplates;L_Word2007AndLaterBinaryDocumentsAndTemplatesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Word2007AndLaterBinaryDocumentsAndTemplates;L_Word2007AndLaterBinaryDocumentsAndTemplatesDropID","uniqueId":4954,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\fileblock","registrySubPath":"word2007files","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Word2007AndLaterDocsAndTemplates","uniqueId":4951,"displayName":"Word 2007 and later documents and templates","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Word2007AndLaterDocsAndTemplates;L_Word2007AndLaterDocsAndTemplatesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Word2007AndLaterDocsAndTemplates;L_Word2007AndLaterDocsAndTemplatesDropID","uniqueId":4950,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Save blocked","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\fileblock","registrySubPath":"openxmlfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Word2AndEarlierBinaryDocumentsAndTemplates","uniqueId":4971,"displayName":"Word 2 and earlier binary documents and templates","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Word2AndEarlierBinaryDocumentsAndTemplates;L_Word2AndEarlierBinaryDocumentsAndTemplatesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Word2AndEarlierBinaryDocumentsAndTemplates;L_Word2AndEarlierBinaryDocumentsAndTemplatesDropID","uniqueId":4970,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\fileblock","registrySubPath":"word2files","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Word6Pt0BinaryDocumentsAndTemplates","uniqueId":4969,"displayName":"Word 6.0 binary documents and templates","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Word6Pt0BinaryDocumentsAndTemplates;L_Word6Pt0BinaryDocumentsAndTemplatesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Word6Pt0BinaryDocumentsAndTemplates;L_Word6Pt0BinaryDocumentsAndTemplatesDropID","uniqueId":4968,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\fileblock","registrySubPath":"word60files","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Word95BinaryDocumentsAndTemplates","uniqueId":4967,"displayName":"Word 95 binary documents and templates","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Word95BinaryDocumentsAndTemplates;L_Word95BinaryDocumentsAndTemplatesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Word95BinaryDocumentsAndTemplates;L_Word95BinaryDocumentsAndTemplatesDropID","uniqueId":4966,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\fileblock","registrySubPath":"word95files","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Word97BinaryDocumentsAndTemplates","uniqueId":4965,"displayName":"Word 97 binary documents and templates","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Word97BinaryDocumentsAndTemplates;L_Word97BinaryDocumentsAndTemplatesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Word97BinaryDocumentsAndTemplates;L_Word97BinaryDocumentsAndTemplatesDropID","uniqueId":4964,"displayName":"File block setting: ","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\fileblock","registrySubPath":"word97files","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_WordXPBinaryDocumentsAndTemplates","uniqueId":4961,"displayName":"Word XP binary documents and templates","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_WordXPBinaryDocumentsAndTemplates;L_WordXPBinaryDocumentsAndTemplatesDropID","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_WordXPBinaryDocumentsAndTemplates;L_WordXPBinaryDocumentsAndTemplatesDropID","uniqueId":4960,"displayName":"File block setting:","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Do not block","description":"","tags":[],"dependencyGroup":null},{"value":2,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open/Save blocked, use open policy","description":"","tags":[],"dependencyGroup":null},{"value":3,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Block","description":"","tags":[],"dependencyGroup":null},{"value":4,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Open in Protected View","description":"","tags":[],"dependencyGroup":null},{"value":5,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Allow editing and open in Protected View","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"recommendedValues":[{"value":2,"recommendation":"security"}],"defaultValue":0,"description":"This policy setting allows you to determine whether users can open, view, edit, or save Word files with the format specified by the title of this policy setting.\n\nIf you enable this policy setting, you can specify whether users can open, view, edit, or save files.\n\nThe options that can be selected are below.  Note: Not all options may be available for this policy setting.\n\n- Do not block: The file type will not be blocked.\n\n- Save blocked: Saving of the file type will be blocked.\n\n- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the \"default file block behavior\" key.\n\n- Block: Both opening and saving of the file type will be blocked, and the file will not open.\n\n- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.\n\n- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.\n\nIf you disable or do not configure this policy setting, the file type will not be blocked.\n","supportedPlatforms":["Windows"],"tags":["File Block Settings","Trust Center","Security","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\security\\fileblock","registrySubPath":"wordxpfiles","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Wraptowindow","uniqueId":4838,"displayName":"Show text wrapped within the document window","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":null},{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Boolean"},"description":"Checks/unchecks the corresponding UI option.","supportedPlatforms":["Windows"],"tags":["Advanced","Word Options","Microsoft Word 2016","Cloud Policies Boolean","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"wraptowwd","registryType":"REG_DWORD","registryHiveType":"User"}}},{"id":"word16;L_Writingstyle","uniqueId":4760,"displayName":"Writing style","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Enabled","description":"","tags":[],"dependencyGroup":{"dependencies":[{"dependee":"word16;L_Writingstyle;L_writingstyle1","logicalOperator":"exists","values":null}],"logicalOperator":0}},{"value":null,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Disabled","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Composite"},"description":"Specifies the writing style Word uses when checking the active document.","supportedPlatforms":["Windows"],"tags":["Proofing","Word Options","Microsoft Word 2016","Cloud Policies"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{}},{"id":"word16;L_Writingstyle;L_writingstyle1","uniqueId":4759,"displayName":"Writing style","settingType":{"possibleValues":{"possibleValuesType":"DiscreteValues","discreteValues":[{"value":0,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Grammar & Style","description":"","tags":[],"dependencyGroup":null},{"value":1,"firstOfficeVersion":"","lastOfficeVersion":"","displayName":"Grammar Only","description":"","tags":[],"dependencyGroup":null}]},"dataType":"Integer"},"defaultValue":0,"description":"Specifies the writing style Word uses when checking the active document.","supportedPlatforms":["Windows"],"tags":["Proofing","Word Options","Microsoft Word 2016","Cloud Policies Enum","Cloud Policies Composite"],"firstOfficeVersion":{},"lastOfficeVersion":{},"agentInstructions":{"orapiKey":{"platforms":["Windows"],"instructionType":"orapiKey","registryKeyPath":"software\\policies\\microsoft\\office\\16.0\\word\\options","registrySubPath":"writingstyle","registryType":"REG_DWORD","registryHiveType":"User"}}}]