Tests Help
421
no
vd
ocx
(e
n)
24
Ma
rch 20
09
How Does this Affect Me?
Macros are simple programs that are used to repeat commands and keystrokes within another
program. A macro can be invoked (run) with a simple command that you assign, such as
[ctrl]+[shift]+[r]. Some viruses are macro viruses and are hidden within a document. When you
open an infected document, the macro virus runs. A macro virus can save itself to other files (such as
the Normal template) and can potentially infect all of your files. If a user on another computer opens
the infected file, the virus can spread to their computer as well.
What Do I Need to Do?
Set the Microsoft Outlook macro security level as follows:
1
Open Outlook.
2
Select
Tools>>Macro>>Security>>Security Level tab
.
3
Select
High, Medium
, or
Low
.
4
Click
ok
.
B.4.4 Microsoft Word Macros
The following sections contain more information:
“Description” on page 421
“Test Properties” on page 421
“How Does this Affect Me?” on page 422
“What Do I Need to Do?” on page 422
Description
This test verifies that the endpoint attempting to connect to your system has the Microsoft Word
macro security level specified by your security standards.
Test Properties
Select the minimum Microsoft Word macro setting for that is required in order for an endpoint to
connect to your network.
Very High
. Only macros installed in trusted locations will be allowed to run. All other signed
and unsigned macros are disabled.
High
. Only signed macros from trusted sources will be allowed to run. Unsigned macros are
automatically disabled
Medium
. You can choose whether or not to run potentially unsafe macros.
Low
. (
not recommended
). You are not protected from potentially unsafe macros. Use this
setting only if you have virus scanning software installed, or you have checked the safety of all
documents you open.
Содержание ZENworks Network Access Control 5.0
Страница 4: ...4 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Страница 14: ...14 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 Glossary 525 ...
Страница 136: ...136 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Страница 156: ...156 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Страница 216: ...216 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Страница 224: ...224 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Страница 226: ...226 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 Figure 8 1 Inline Installations ...
Страница 227: ...High Availability and Load Balancing 227 novdocx en 24 March 2009 Figure 8 2 DHCP Installation ...
Страница 234: ...234 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Страница 294: ...294 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Страница 310: ...310 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Страница 328: ...328 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Страница 378: ...378 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Страница 384: ...384 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Страница 392: ...392 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Страница 436: ...436 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Страница 442: ...442 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Страница 450: ...450 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Страница 460: ...460 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Страница 524: ...524 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Страница 534: ...534 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...