Microsoft PowerPoint 2016Microsoft PowerPoint 201616.0.4266.1001ConvertersTurn on an external converter as the default for a file extensionList of external file format converters to customizeThis policy setting allows you to enable an external file format converter as the default for a particular file extension on a computer. To set this policy you need to specify the file extension (e.g. "odp") for Value Name and the external file format converter via the converter's classname (e.g. "TestConverter") for Value.
If you enable this policy setting for a particular file extension, the file format converter specified for that extension is used as the default converter for loading the files.
If you do not configure this policy setting for a particular file extension, Microsoft PowerPoint processes files with that extension in an application defined manner.
Note: This policy can only be specified once per file extension.Show Mini Toolbar on selectionTrusted LocationsBlock macros from running in Office files from the Internet
This policy setting allows you to block macros from running in Office files that come from the Internet.
If you enable this policy setting, macros are blocked from running, even if “Enable all macros” is selected in the Macro Settings section of the Trust Center. Also, instead of having the choice to “Enable Content,” users will receive a notification that macros are blocked from running. If the Office file is saved to a trusted location or was previously trusted by the user, macros will be allowed to run.
If you disable or don’t configure this policy setting, the settings configured in the Macro Settings section of the Trust Center determine whether macros run in Office files that come from the Internet.
This policy setting controls whether the specified Office application notifies users when unsigned application add-ins are loaded or silently disable such add-ins without notification. This policy setting only applies if you enable the "Require that application add-ins are signed by Trusted Publisher" policy setting, which prevents users from changing this policy setting.
If you enable this policy setting, applications automatically disable unsigned add-ins without informing users.
If you disable this policy setting, if this application is configured to require that all add-ins be signed by a trusted publisher, any unsigned add-ins the application loads will be disabled and the application will display the Trust Bar at the top of the active window. The Trust Bar contains a message that informs users about the unsigned add-in.
If you do not configure this policy setting, the disable behavior applies, and in addition, users can configure this requirement themselves in the "Add-ins" category of the Trust Center for the application.Disable Trust Bar Notification for unsigned application add-ins and block themThis policy setting controls whether add-ins for this applications must be digitally signed by a trusted publisher.
If you enable this policy setting, this application checks the digital signature for each add-in before loading it. If an add-in does not have a digital signature, or if the signature did not come from a trusted publisher, this application disables the add-in and notifies the user. Certificates must be added to the Trusted Publishers list if you require that all add-ins be signed by a trusted publisher. For detail on about obtaining and distributing certificates, see http://go.microsoft.com/fwlink/?LinkId=294922. Office 2016 stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Office 2016 still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store. Therefore, if you created a list of trusted publishers in a previous version of Office and you upgrade to Office 2016, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store. For more information about trusted publishers, see the Office Resource Kit.
If you disable or do not configure this policy setting, this application does not check the digital signature on application add-ins before opening them. If a dangerous add-in is loaded, it could harm users' computers or compromise data security.Require that application add-ins are signed by Trusted PublisherTrust CenterCryptographyProtected ViewFile Block SettingsSet default file block behaviorThis policy setting allows you to determine if users can open, view, or edit Word files.
If you enable this policy setting, you can set one of these options:
- Blocked files are not opened
- Blocked files open in Protected View and can not be edited
- Blocked files open in Protected View and can be edited
If you disable or do not configure this policy setting, the behavior is the same as the "Blocked files are not opened" setting. Users will not be able to open blocked files.Blocked files are not openedBlocked files open in Protected View and can not be editedBlocked files open in Protected View and can be editedPowerPoint 2007 and later presentations, shows, templates, themes and add-in filesOpenDocument Presentation filesPowerPoint 97-2003 presentations, shows, templates and add-in filesWeb PagesOutline filesLegacy converters for PowerPointGraphic FiltersMicrosoft Office Open XML converters for PowerPointPowerPoint beta convertersPowerPoint beta filesThis policy setting allows you to determine whether users can open, view, edit, or save PowerPoint files with the format specified by the title of this policy setting.
If you enable this policy setting, you can specify whether users can open, view, edit, or save files.
The options that can be selected are below. Note: Not all options may be available for this policy setting.
- Do not block: The file type will not be blocked.
- Save blocked: Saving of the file type will be blocked.
- Open/Save blocked, use open policy: Both opening and saving of the file type will be blocked. The file will open based on the policy setting configured in the "default file block behavior" key.
- Block: Both opening and saving of the file type will be blocked, and the file will not open.
- Open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit the file type will not be enabled.
- Allow editing and open in Protected View: Both opening and saving of the file type will be blocked, and the option to edit will be enabled.
If you disable or do not configure this policy setting, the file type will not be blocked.Do not blockSave blockedOpen/Save blocked, use open policyBlockOpen in Protected ViewAllow editing and open in Protected ViewDisable all application add-insThis policy setting disables all add-ins for the specified Office 2016 applications.
If you enable this policy setting, all add-ins for the specified Office 2016 applications are disabled.
If you disable or do not configure this policy setting, all add-ins for the specified Office 2016 applications are allowed to run without notifying the users.This policy setting allows you to specify a location that is used as a trusted source for opening files in this application. Files in trusted locations bypass file validation, active content checks and Protected View. Macros and code in these files will execute without displaying warnings to the user. If you change or add a location make sure that the new location is secured, with only appropriate user permissions to add document/files.
If you enable this policy setting, you may specify a folder location, path, and date from which files can the application can open files which run macros without warning. If you check the "Allow sub folders" check box, then all sub-folders in the folder you specify will also be trusted.
If you disable or do not configure this policy setting, the trusted location is not specified.Path:Date:Description:Allow sub folders:Trusted Location #1Trusted Location #2Trusted Location #3Trusted Location #4Trusted Location #5Trusted Location #6Trusted Location #7Trusted Location #8Trusted Location #9Trusted Location #10Trusted Location #11Trusted Location #12Trusted Location #13Trusted Location #14Trusted Location #15Trusted Location #16Trusted Location #17Trusted Location #18Trusted Location #19Trusted Location #20Allow Trusted Locations on the networkThis policy setting controls whether trusted locations on the network can be used.
If you enable this policy setting, users can specify trusted locations on network shares or in other remote locations that are not under their direct control by clicking the "Add new location" button in the Trusted Locations section of the Trust Center. Content, code, and add-ins are allowed to load from trusted locations with minimal security and without prompting the user for permission.
If you disable this policy setting, the selected application ignores any network locations listed in the Trusted Locations section of the Trust Center.
If you also deploy Trusted Locations via Group Policy, you should verify whether any of them are remote locations. If any of them are remote locations and you do not allow remote locations via this policy setting, those policy keys that point to remote locations will be ignored on client computers.
Disabling this policy setting does not delete any network locations from the Trusted Locations list, but causes disruption for users who add network locations to the Trusted Locations list. Users are also prevented from adding new network locations to the Trusted Locations list in the Trust Center. We recommended that you do not enable this policy setting (as the "Allow Trusted Locations on my network (not recommended)" check box also states). Therefore, in practice, it should be possible to disable this policy setting in most situations without causing significant usability issues for most users.
If you do not enable this policy setting, users can select the "Allow Trusted Locations on my network (not recommended)" check box if desired and then specify trusted locations by clicking the "Add new location" button.Disable all trusted locationsThis policy setting allows administrators to disable all trusted locations in the specified applications. Trusted locations specified in the Trust Center are used to define file locations that are assumed to be safe. Content, code, and add-ins are allowed to load from trusted locations with a minimal amount of security, without prompting the users for permission. If a dangerous file is opened from a trusted location, it will not be subject to standard security measures and could harm users' computers or data.
If you enable this policy setting, all trusted locations (those specified in the Trust Center) in the specified applications are ignored, including any trusted locations established by Office 2016 during setup, deployed to users using Group Policy, or added by users themselves. Users will be prompted again when opening files from trusted locations.
If you disable or do not configure this policy setting, all trusted locations (those specified in the Trust Center) in the specified applications are assumed to be safe.Turn off trusted documentsThis policy setting allows you to turn off the trusted documents feature. The trusted documents feature allows users to always enable active content in documents such as macros, ActiveX controls, data connections, etc. so that they are not prompted the next time they open the documents. Trusted documents are exempt from security notifications.
If you enable this policy setting, you will turn off the trusted documents feature. Users will receive a security prompt every time a document containing active content is opened.
If you disable or do not configure this policy setting, documents will be trusted when users enable content for a document, and users will not receive a security prompt.Set maximum number of trusted documentsThis policy setting allows you to specify the maximum number of trust records for trusted documents that can be stored in the registry before the purge task runs. The purge task reduces the number of trusted documents stored in the registry to the value set by the "Set maximum number of trust records to preserve" policy setting.
If you enable this policy setting, you can specify the maximum number of trusted documents to be stored in the registry before the purge task runs, with an upper limit of 20,000 documents. For performance reasons, we do not recommend setting this policy setting to the upper limit.
If you disable or do not configure this policy setting, the default value of 500 is used for the maximum number of trusted documents that can be stored in the registry before the purge task runs.Set maximum number of trust records to preserveThis policy setting allows you to specify the maximum number of trust records to preserve when the purge task detects that this application has trusted more than the number of trusted documents set by the "Set maximum number of trusted documents" policy setting.
If you enable this policy setting, you may specify the maximum number of trust records to preserve, with an upper limit of 20000. Due to performance reasons, it is not recommended to set it to the upper limit.
If you disable or you do not configure this policy setting, the default value for of 400 is used.VBA Macro Notification SettingsThis policy setting controls how the specified applications warn users when Visual Basic for Applications (VBA) macros are present.
If you enable this policy setting, you can choose from four options for determining how the specified applications will warn the user about macros:
- Disable all with notification: The application displays the Trust Bar for all macros, whether signed or unsigned. This option enforces the default configuration in Office.
- Disable all except digitally signed macros: The application displays the Trust Bar for digitally signed macros, allowing users to enable them or leave them disabled. Any unsigned macros are disabled, and users are not notified.
- Disable all without notification: The application disables all macros, whether signed or unsigned, and does not notify users.
- Enable all macros (not recommended): All macros are enabled, whether signed or unsigned. This option can significantly reduce security by allowing dangerous code to run undetected.
If you disable this policy setting, "Disable all with notification" will be the default setting.
If you do not configure this policy setting, when users open files in the specified applications that contain VBA macros, the applications open the files with the macros disabled and display the Trust Bar with a warning that macros are present and have been disabled. Users can inspect and edit the files if appropriate, but cannot use any disabled functionality until they enable it by clicking "Enable Content" on the Trust Bar. If the user clicks "Enable Content", then the document is added as a trusted document.
Important: If "Disable all except digitally signed macros" is selected, users will not be able to open unsigned Access databases.
Also, note that Microsoft Office stores certificates for trusted publishers in the Internet Explorer trusted publisher store. Earlier versions of Microsoft Office stored trusted publisher certificate information (specifically, the certificate thumbprint) in a special Office trusted publisher store. Microsoft Office still reads trusted publisher certificate information from the Office trusted publisher store, but it does not write information to this store.
Therefore, if you created a list of trusted publishers in a previous version of Microsoft Office and you upgrade to Office, your trusted publisher list will still be recognized. However, any trusted publisher certificates that you add to the list will be stored in the Internet Explorer trusted publisher store.Disable all with notificationDisable all except digitally signed macrosDisable all without notificationEnable all macros (not recommended)Action:Check spelling as you typeChecks/Unchecks the corresponding UI option.CustomCustomizable Error MessagesDisable commandsDisable Items in User InterfaceDisable shortcut keysDisplay Name:Enter a command bar ID to disableEnter a key and modifier to disableEnter error ID for Value Name and custom button text for ValueFull path including filename (required):GeneralList of error messages to customizeMiscellaneousPredefinedNumber of presentations in the Recent Presentations listSaveSection of work pane to display link:SecurityThis policy setting allows you to disable any command bar button and menu item with a command bar ID, including command bar buttons and menu items that are not in the predefined lists.
If you enable this policy setting, you can enter an ID number to disable a specific command bar button or menu item. The ID number needs to be in decimal (not hexadecimal). Multiple values should be separated by commas.
If you disable or do not configure this policy setting, all default command bar buttons or menu items are available to users.Web Options...Display Developer tab in the RibbonThis policy setting controls whether the Developer tab will be displayed in the Ribbon.
If you enable this policy setting, the Developer tab will be displayed in the Ribbon.
If you disable this policy setting, the Developer tab will not be displayed in the Ribbon.
If you do not configure this policy setting, the Developer tab will not be displayed in the Ribbon, but its visibility can be changed via a setting in the application Options dialog box.Customize RibbonWhen selecting, automatically select entire wordShow all windows in the TaskbarTurn off file synchronization via SOAP over HTTPThis policy setting controls file synchronization via SOAP over HTTP for PowerPoint.
If you enable this policy setting, file synchronization via SOAP over HTTP is turned off for PowerPoint.
If you disable or do not configure this policy setting this policy setting, file synchronization via SOAP over HTTP is turned on for PowerPoint.
Note: Turning off file synchronization via SOAP over HTTP will also prevent co-authoring and adversely affect the behavior of SharePoint Workspaces.Prevent co-authoringThis policy setting controls how PowerPoint opens a file for editing on document management servers that support co-authoring.
If you enable this policy setting, PowerPoint will prevent co-authoring by taking an exclusive file lock.
If you disable or do not configure this policy setting, PowerPoint will allow co-authoring by taking short-term shared locks.
Note: When file synchronization via SOAP over HTTP is turned off it will prevent co-authoring..ppt.pps.pot.ppsx.potx.pptx.ppsm.pptm.potmOpen files on local Intranet UNC in Protected ViewThis policy setting lets you determine if files on local Intranet UNC file shares open in Protected View.
If you enable this policy setting, files on local Intranet UNC file shares open in Protected View if their UNC paths appear to be within the Internet zone.
If you disable or do not configure this policy setting, files on Intranet UNC file shares do not open in Protected View if their UNC paths appear to be within the Internet zone.Do not open files in unsafe locations in Protected ViewThis policy setting lets you determine if files located in unsafe locations will open in Protected View. If you have not specified unsafe locations, only the "Downloaded Program Files" and "Temporary Internet Files" folders are considered unsafe locations.
If you enable this policy setting, files located in unsafe locations do not open in Protected View.
If you disable or do not configure this policy setting, files located in unsafe locations open in Protected View.Do not open files from the Internet zone in Protected ViewThis policy setting allows you to determine if files downloaded from the Internet zone open in Protected View.
If you enable this policy setting, files downloaded from the Internet zone do not open in Protected View.
If you disable or do not configure this policy setting, files downloaded from the Internet zone open in Protected View.Turn off Protected View for attachments opened from OutlookThis policy setting allows you to determine if PowerPoint files in Outlook attachments open in Protected View.
If you enable this policy setting, Outlook attachments do not open in Protected View.
If you disable or do not configure this policy setting, Outlook attachments open in Protected View.Set CNG cipher algorithmThis policy setting allows you to configure the CNG cipher algorithm that is used.
If you enable this policy setting, then the cipher provided will be used if it is a supported algorithm.
If you disable or do not configure this policy setting, AES will be used.Configure CNG cipher chaining modeThis policy setting allows you to configure the cipher chaining mode used.
If you enable this policy setting, the cipher chaining mode specified will be applied.
If you disable or do not configure this policy setting, Cipher Block Chaining (CBC) will be the default CNG cipher chaining mode used.Cipher Block Chaining (CBC)Cipher Feedback (CFB)Set CNG cipher key lengthThis policy setting allows you to configure the number of bits to use when creating the cipher key. This number will be rounded down to a multiple of 8.
If you enable this policy setting, the key bits specified will be used.
If you disable or do not configure this policy setting, the default value will be used.Specify encryption compatibilityThis policy setting allows you to specify the encrypted database compatibility.
If you enable this policy setting, the compatibility format specified will be applied during encryption for new files
- Use legacy format
- Use next generation format
- All files save with next generation: All files save with the next generation format
If you disable or do not configure this policy setting, the default setting, "Use next generation format," will be applied.Use legacy formatUse next generation formatAll files save with next generationSet parameters for CNG contextThis policy setting allows you to specify the encryption parameters that should be used for the CNG context.
If you enable this policy setting, the parameters specified will be passed to the CNG context.
If you disable or do not configure this policy setting, the default CNG values will be used.Specify CNG hash algorithmThis policy setting allows you to specify the hash algorithm used.
If you enable this policy setting, the hashing algorithm selected will be used by CNG.
If you disable or do not configure this policy setting, the default CNG hash algorithm will be used.SHA1SHA256SHA384SHA512Set CNG password spin countThis policy setting allows you to specify the number of times to spin (rehash) the password verifier.
If you enable this policy setting, the number specified will be the number of times the password will be rehashed.
If you disable or do not configure this policy setting, the default (100000) will be used.Use new key on password changeThis policy setting allows you to specify if a new encryption key is used when the password is changed.
If you enable or do not configure this policy setting, a new intermediate key is generated when the password is changed. This causes any extra key encryptors to be removed when the file is saved.
If you disable this policy setting, a new intermediate key is not generated when the password is changed.Specify CNG random number generator algorithmThis policy setting allows you to configure the CNG random number generator to use.
If you enable this policy setting, the random number generator specified will be used.
If you disable or do not configure this policy setting, the default random number generator will be used.Specify CNG salt lengthThis policy setting allows you to specific the number of bytes of salt that should be used.
If you enable this policy setting, the bytes specified will be used.
If you disable or do not configure this policy setting, the default length or 16 will be used.Turn off Trusted Documents on the networkThis policy setting allows you to turn off the trusted documents feature for documents opened from the network.
If you enable this policy setting, users will always see security notifications for active content such as macros, ActiveX controls, data connections, etc. for documents opened from the network.
If you disable or do not configure this policy setting, the trusted documents feature allows users to always allow active content in documents such as macros, ActiveX controls, data connections, etc. so that users are not prompted the next time they open the documents. Trusted documents are exempt from security notifications.Set document behavior if file validation failsThis policy setting controls how Office handles documents when they fail file validation.
If you enable this policy setting, you can configure the following options for files that fail file validation:
- Block files completely. Users cannot open the files.
- Open files in Protected View and disallow edit. Users cannot edit the files. This is also how Office handles the files if you disable this policy setting.
- Open files in Protected View and allow edit. Users can edit the files. This is also how Office handles the files if you do not configure this policy setting.
If you disable this policy setting, Office follows the "Open files in Protected View and disallow edit" behavior.
If you do not configure this policy setting, Office follows the "Open files in Protected View and allow edit" behavior.Block filesOpen in Protected ViewTurn off file validationThis policy setting allows you turn off the file validation feature.
If you enable this policy setting, file validation will be turned off.
If you disable or do not configure this policy setting, file validation will be turned on. Office Binary Documents (97-2003) are checked to see if they conform against the file format schema before they are opened.Scan encrypted macros in PowerPoint Open XML presentationsThis policy setting controls whether encrypted macros in Open XML presentations are required to be scanned with anti-virus software before being opened.
If you enable this policy setting, you may choose one of these options:
- Scan encrypted macros: encrypted macros are disabled unless anti-virus software is installed. Encrypted macros are scanned by your anti-virus software when you attempt to open an encrypted presentation that contains macros.
- Scan if anti-virus software available: if anti-virus software is installed, scan the encrypted macros first before allowing them to load. If anti-virus software is not available, allow encrypted macros to load.
- Load macros without scanning: do not check for anti-virus software and allow macros to be loaded in an encrypted file.
If you disable or do not configure this policy setting, the behavior will be similar to the "Scan encrypted macros" option.Scan encrypted macros (default)Scan if anti-virus software availableLoad macros without scanningRun ProgramsThis policy setting controls the prompting and activation behavior for the "Run Programs" option for action buttons in PowerPoint.
If you enable this policy setting, you can choose from three options to control how the "Run Programs" option functions:
- Disable (don't run any programs). If users click an action button with the "Run Programs" action assigned to it, nothing will happen. This option enforces the default configuration in PowerPoint.
- Enable (prompt user before running). If users click an action button with the "Run Programs" action assigned to it, PowerPoint will prompt them to continue before running the program.
- Enable all (run without prompting). If users click an action button with the "Run Programs" action assigned to it. PowerPoint will run the program automatically, without prompting.
If you disable or do not configure this policy setting, if users click an action with the "Run Programs" action assigned to it, nothing will happen. This behavior is the same as Enabled -- Disable (don't run any programs).disable (don't run any programs)enable (prompt user before running)enable all (run without prompting)This policy setting specifies the number of entries displayed in the Recent Presentations list that appears when users click Open on the File tab in Backstage view.
If you enable this policy setting, you can specify the number of entries to be between 0 and 50. If you set the number to 0, all pinned and unpinned entries are hidden.
If you disable or do not configure this policy setting, a maximum of 25 items will be displayed in the Recent Presentations list.
Note: If you want to prevent items from being added to the Recent Presentations list entirely, you can enable the "Do not keep history of recently opened documents" Windows policy setting.Check to Disable Package for CD; Uncheck to Enable Package for CD. Shows or hides the File tab | Save & Send | Package Presentation for CD command. Package for CD allows the user to package and burn presentations onto CD for portable viewing even when PowerPoint is not installed.Disable Package For CDKeep the last AutoSaved versions of files for the next sessionThis policy setting determines whether PowerPoint keeps the last AutoSaved version of a file if a user closes a file without saving it. (Note: AutoSave applies only when AutoRecover is enabled.)
If you enable or do not configure this policy setting, PowerPoint keeps the last AutoSaved version of the file and makes it available to the user the next time the file is opened if the user closes a file without saving it.
If you disable this policy setting, PowerPoint does not keep the last AutoSaved version of the file if the user closes a file without saving it.Suppress file format compatibility dialog box for OpenDocument Presentation formatThis policy setting allows you to enable or disable the file format compatibility dialog box when saving a file as an OpenDocument presentation file in Microsoft PowerPoint.
If you enable this policy, the file format compatibility dialog is displayed whenever you save as an OpenDocument presentation file in PowerPoint.
If you disable this policy, the file format compatibility dialog is not displayed when you save as an OpenDocument presentation file in PowerPoint.This policy setting controls whether users can link slides in a presentation with their counterparts in a PowerPoint Slide Library.
If you enable this policy setting, PowerPoint cannot check the status of a slide in a Slide Library when a presentation with Slide Update data is opened.
If you disable or do not configure this policy setting, each time users open a presentation that contains a shared slide, PowerPoint notifies them if the slide has been updated and provides them with the opportunity to ignore the update, append a new slide to the outdated slide, or replace the outdated slide with the updated one.Disable Slide UpdateSave AutoRecover infoHides the built in table styles for PowerPoint. By default, built-in styles are shown.Hide built in table stylesEnabling this policy to turn contextual spelling on by default.Check grammar with spellingAdd slide navigation controlsDisabling this policy setting will result in Mini Toolbar not being displayed on text selection. By default, Mini Toolbar on selection is enabled and its visibility can be changed via a setting in the PowerPoint Options dialog box.Alt+F11 (Developer | Code | Visual Basic)Alt+F8 (Developer | Code | Macros)AutoFit body text to placeholderAutoFit title text to placeholderAutoFormat as you typeAutoRecover save frequency (minutes):AutoRecover save locationPrint in background Black text on whiteBrowser colorsChecked: Checks the option ''Save AutoRecover info''. | Unchecked: Unchecks the option ''Save AutoRecover info''.Checked: Checks the option ''Show menu on right mouse click''. | Unchecked: Unchecks the option ''Show menu on right mouse click''.Checked: Checks the option ''Show popup toolbar''. | Unchecked: Unchecks the option ''Show popup toolbar''.This policy setting controls whether hidden markup is visible when users open PowerPoint files in standard or HTML format.
If you enable this policy setting, PowerPoint ignores this flag when opening a file, and always displays any markup present in the file. In addition, when saving a file, PowerPoint sets the flag to display markup when the presentation is next opened.
If you disable this policy setting, PowerPoint sets the flag according to the state of the "Show Markup" option on the Review tab of the Ribbon when it saves presentations in standard or HTML format. In addition, PowerPoint enables or disables the "Show Markup" option according to the way the flag is set when it opens files, which means that a presentation saved with hidden markup is opened with the markup still hidden.
If you disable this policy setting, the behavior is the equivalent of Enabled.ColorsCtrl+F (Home | Editing | Find)Ctrl+K (Insert | Links | Hyperlink)Default file locationThis policy setting allows you to disable specific command bar buttons and menu items in the specified applications.
If you enable this policy setting you can disable specific command bar buttons and menu items in the user interface for the selected application. The predefined list of command bar buttons and menu items you can disable becomes available to you when you enable this policy setting.
If you disable or do not configure this policy setting, the predefined list of command bar buttons and menu items are enabled for the application.This policy setting allows you to disable specific shortcut key combinations in the specified applications.
If you enable this policy setting you can disable specific shortcut keys for the selected application. The predefined list of shortcut keys you can disable becomes available to you when you enable this policy setting.
If you disable or do not configure this policy setting, the predefined list of shortcut keys are enabled for the application.Allow text to be dragged and droppedEnable save AutoRecover infoEnd with black slideMake hidden markup visibleMaximum number of undosMicrosoft PowerPoint 2016Microsoft PowerPoint 2016 (Machine)Collaboration SettingsCo-authoringShow menu on right mouse clickPowerPoint 97-2003 Presentation (*.ppt)PowerPoint Presentation (*.pptx)PowerPoint Macro-Enabled Presentation (*.pptm)OpenDocument Presentation (*.odp)Presentation colors (accent color)Presentation colors (text color)Print inserted objects at printer resolutionNumber of folders in the Recent Folders listThis policy setting specifies the number of unpinned entries displayed in the Recent Folders list that appears when users click Open or Save As on the File tab in Backstage view.
If you enable this policy setting, you can specify the number of unpinned entries to be between 0 and 20. If you set the number to 0, all pinned and unpinned entries are hidden.
If you disable or do not configure this policy setting, a maximum of 5 unpinned items are displayed in the Recent Folders list.
Note: If you want to prevent items from being added to the Recent Folders list entirely, you can enable the "Do not keep history of recently opened documents" Windows policy setting.Print TrueType fonts as graphicsReplace straight quotes with smart quotesResize graphics to fit browser windowDefault file formatShow popup toolbarShow slide animation while browsingSize of recently used file listSlide navigationThis policy setting governs the default format for new presentation files that users create.
If you enable this policy setting, when a user creates a new blank presentation, it is in the specified default format. Users may still override the default and specify a specific format when they create a presentation.
If you disable or do not configure this policy setting, PowerPoint Presentation is the default option.Specifies the default location for presentation files.Specifies the list of error messages to customize.Specifies the maximum number of undo levels.This policy setting allows you to disable any shortcut key by using its virtual key code ID, including shortcut keys that are not in the predefined lists.
If you enable this policy setting, you can enter a virtual key code ID number to disable a specific shortcut key.
If you disable or do not configure this policy setting, all default shortcut keys are enabled for users.Trust access to Visual Basic ProjectThis policy setting controls whether automation clients such as Microsoft Visual Studio 2005 Tools for Microsoft Office (VSTO) can access the Visual Basic for Applications project system in the specified applications. VSTO projects require access to the Visual Basic for Applications project system in Excel, PowerPoint, and Word, even though the projects do not use Visual Basic for Applications. Design-time support of controls in both Visual Basic and C# projects depends on the Visual Basic for Applications project system in Word and Excel.
If you enable this policy setting, VSTO and other automation clients can access the Visual Basic for Applications project system in the specified applications. Users will not be able to change this behavior through the "Trust access to the VBA project object model" user interface option under the Macro Settings section of the Trust Center.
If you disable this policy setting, VSTO does not have programmatic access to VBA projects. In addition, the "Trust access to the VBA project object model" check box is cleared and users cannot change it. Note: Disabling this policy setting prevents VSTO projects from interacting properly with the VBA project system in the selected application.
If you do not configure this policy setting, automation clients do not have programmatic access to VBA projects. Users can enable this by selecting the "Trust access to the VBA project object model" in the "Macro Settings" section of the Trust Center. However, doing so allows macros in any documents the user opens to access the core Visual Basic objects, methods, and properties, which represents a potential security hazard.Use smart cut and pasteShow vertical rulerWhite text on blackGeneralFile TabCheck AccessibilityProofingAdvancedPowerPoint OptionsEnable Live PreviewShows or hides the Live Preview that appear when using Galleries that support previews. Live Preview shows how a command would be applied without actually applying it to the document.Stop checking for alt text accessibility informationThis policy setting prevents the Accessibility Checker from verifying that objects such as images and shapes contain alt text.
If you enable this policy setting, the Accessibility Checker will be prevented from verifying that objects such as images and shapes contain alt text.
If you disable or do not configure this policy setting, objects will be checked for alternative text and any issues will appear in the Accessibility Checker.Stop checking to ensure hyperlink text is meaningfulThis policy setting prevents the Accessibility Checker from verifying that hyperlinks have meaningful text.
If you enable this policy setting, the Accessibility Checker will be prevented from verifying that hyperlinks have meaningful text.
If you disable or do not configure this policy setting, hyperlink text will be checked and any issues will appear in the Accessibility Checker.Stop checking for media files which might need captionsThis policy setting prevents the Accessibility Checker from flagging media files that might need caption information.
If you enable this policy setting, the Accessibility Checker will be prevented from flagging media files that might need caption information.
If you disable or do not configure this policy setting, presentations will be scanned for media files and the results will appear in the Accessibility Checker.Stop checking for table header accessibility informationThis policy setting prevents the Accessibility Checker from verifying that tables have a header row specified.
If you enable this policy setting, the Accessibility Checker will be prevented from verifying that tables have a header row specified.
If you disable or do not configure this policy setting, tables will be checked for header rows and any issues will appear in the Accessibility Checker.Stop checking for blank table rows and columnsThis policy setting prevents the Accessibility Checker from verifying that blank rows and columns have not been inserted into tables.
If you enable this policy setting, the Accessibility Checker will be prevented from verifying that blank rows and columns have not been inserted into tables.
If you disable or do not configure this policy setting, tables will be checked for blank rows and columns and any issues will appear in the Accessibility Checker.Stop checking for merged and split cellsThis policy setting prevents the Accessibility Checker from verifying that tables do not have merged or split cells.
If you enable this policy setting, the Accessibility Checker will be prevented from verifying that tables do not have merged or split cells.
If you disable or do not configure this policy setting, tables will be checked for merged and split cells and any issues will appear in the Accessibility Checker.Stop checking that slide titles existThis policy setting prevents the Accessibility Checker from verifying that every slide has a title placeholder.
If you enable this policy setting, the Accessibility Checker will be prevented from verifying that every slide has a title placeholder.
If you disable or do not configure this policy setting, slides will be checked for titles and any issues will appear in the Accessibility Checker.Stop checking to ensure each slide has a unique titleThis policy setting prevents the Accessibility Checker from verifying that every slide has a unique title.
If you enable this policy setting, the Accessibility Checker will be prevented from verifying that every slide has a unique title.
If you disable or do not configure this policy setting, slide titles will be checked for uniqueness and any issues will appear in the Accessibility Checker.Stop checking to ensure a meaningful order of objects on slidesThis policy setting prevents the Accessibility Checker from checking if a slide has non-placeholder objects which might be read back out of order.
If you enable this policy setting, the Accessibility Checker will be prevented from checking if a slide has non-placeholder objects which might be read back out of order.
If you disable or do not configure this policy setting, slides will be checked for objects which might be read back out of order and any issues will appear in the Accessibility Checker.Stop checking to ensure presentations allow programmatic accessThis policy setting prevents the Accessibility Checker from checking to ensure that presentations have not blocked programmatic access through DRM.
If you enable this policy setting, the Accessibility Checker will be prevented from checking to ensure that presentations have not blocked programmatic access through DRM.
If you disable or do not configure this policy setting, presentations will be checked for programmatic access and any issues will appear in the Accessibility Checker.Unblock automatic download of linked imagesThis policy setting determines whether PowerPoint automatically downloads links from external sources.
If you enable this policy setting, PowerPoint will load images saved in remote locations.
If you disable or do not configure this policy setting, when PowerPoint opens a presentation it does not display any linked images saved on a different computer unless the presentation itself is saved in a trusted location (as configured in the Trust Center).Action:Path:Allow sub folders:Section of work pane to display link:Action:Path:List of error messages to customizeDescription:Date:Description:Path:Description:Description:Action:Disable shortcut keysSection of work pane to display link:Date:Path:Action:Allow sub folders:Display Name:Date:Section of work pane to display link:Allow sub folders:Allow sub folders:Allow sub folders:Allow sub folders:Allow sub folders:Path:Allow sub folders:Date:Allow sub folders:Allow sub folders:Section of work pane to display link:Full path including filename (required):Date:Date:Display Name:Description:Action:Path:Path:Path:Date:Date:Full path including filename (required):Path:Date:Display Name:Description:Description:Date:Description:Description:Path:Allow sub folders:Allow sub folders:Full path including filename (required):Date:Action:Display Name:Disable commandsDescription:Date:Description:Display Name:Path:Description:Path:Section of work pane to display link:Maximum number of undosPath:Display Name:Display Name:Allow sub folders:Section of work pane to display link:Allow sub folders:Allow sub folders:Action:Section of work pane to display link:Description:Date:Full path including filename (required):Description:Action:Display Name:Default file locationDate:Full path including filename (required):Path:Description:Full path including filename (required):Date:Date:Full path including filename (required):Path:Display Name:Full path including filename (required):Date:Section of work pane to display link:MiscellaneousServer SettingsPath:Section of work pane to display link:Path:Allow sub folders:Date:Description:Full path including filename (required):Description:Description:Allow sub folders:Description:Path:Allow sub folders:Allow sub folders:Action:Date:Path:Block all unmanaged add-insThis policy setting blocks all add-ins that are not managed by the "List of managed add-ins" policy setting.
If you enable this policy setting, and the "List of managed add-ins" policy setting is also enabled, all add-ins are blocked except those that are configured as 1 (always enabled) or 2 (configurable by the user) in the "List of managed add-ins" policy setting.
If you disable or do not configure this policy setting, users can enable or disable any add-ins that are not managed by the "List of managed add-ins" policy setting.List of managed add-insList of managed add-insThis policy setting allows you to specify which add-ins are always enabled, always disabled (blocked), or configurable by the user. To block add-ins that are not managed by this policy setting, you must also configure the "Block all unmanaged add-ins" policy setting.
To enable this policy setting, provide the following information for each add-in:
In "Value name," specify the programmatic identifier (ProgID) for COM add-ins, or specify the file name of PowerPoint add-ins.
To obtain the ProgID for an add-in, use Registry Editor on the client computer where the add-in is installed to locate key names under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\PowerPoint\Addins or HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\PowerPoint\Addins.
To obtain the file name of an add-in, click the File menu in the application where the add-in is installed. Click Options, click Add-ins, and then use the Location column to determine the file name of the add-in.
You can also obtain the ProgID or the file name of an add-in by using Office Telemetry Dashboard.
In "Value," specify the value as follows:
To specify that an add-in is always disabled (blocked), type 0.
To specify that an add-in is always enabled, type 1.
To specify that an add-in is configurable by the user and not blocked by the "Block all unmanaged add-ins" policy setting when enabled, type 2.
If you disable or do not enable this policy setting, the list of managed add-ins is deleted. If the "Block all unmanaged add-ins" policy setting is enabled, then all add-ins are blocked.Allow formatting and labels to track data pointsThis policy setting governs how custom formatting and data labels react to data changes in a chart.
If you enable or do not configure this policy setting, when the user creates a new presentation, custom formatting and data labels follow data points as they move or change in any chart in the workbook.
If you disable this policy setting, custom formatting and data labels do not follow data points, but instead follow data point indices.This policy setting specifies whether PowerPoint prompts users to change their file extension associations for any file types that are no longer associated with PowerPoint.
If you enable this policy setting, when users start PowerPoint, they are not prompted to change file extensions for any files that are no longer associated with PowerPoint. In addition, the checkbox on the user interface (UI) under File |Options | General | Start up options | Tell me is unchecked.
If you disable or do not configure this policy setting, when users start PowerPoint, they are prompted to change file extensions for any files that are no longer associated with PowerPoint. Users can change this behavior either by selecting the checkbox displayed in the prompt, or by selecting the UI checkbox under File |Options | General | Start up options | Tell me (which is selected by default).
Prompt the user if PowerPoint is not the default application for its file extensionsDisable the Office Start screen for PowerPointThis policy setting controls whether the Office Start screen appears on boot for PowerPoint.
If you enable this policy setting, users will not see the Office Start screen when they boot PowerPoint.
If you disable or do not configure this policy setting, users will see the Office Start screen when they boot PowerPoint.
Note: This policy setting is overridden by the policy setting "Microsoft Office 2016 > Miscellaneous > Disable the Office Start screen for all Office applications" if that policy setting is set.Personal templates path for PowerPointThis policy setting specifies the location of a user's personal templates.
If you enable this policy setting, users will see any templates they have saved in the specified location in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will change to be the specified location.
If you disable or do not configure this policy setting, users will not see templates they have saved in the custom templates tab on the Office Start screen and in File | New and when saving a template their default folder will be their document save location.Show custom templates tab by default in PowerPoint on the Office Start screen and in File | NewThis policy setting controls whether custom templates (when they exist) show as the default tab in PowerPoint on the Office Start screen and in File | New.
If you enable this policy setting, users will the see custom templates tab as the default tab in PowerPoint on the Office Start screen and in File | New when templates exist (this can include Custom XML programmed templates, templates in the Workgroup templates path, templates in the Personal templates path, or SharePoint templates).
If you disable or do not configure this policy setting, users will see the Featured templates tab as the default tab in PowerPoint on the Office Start screen and in File | New, unless all Office-provided templates have been disabled.Do not allow PowerPoint to automatically extend display when presenting on a laptop or tabletThis policy setting specifies whether PowerPoint automatically extends the display when users present on a laptop or tablet computer.
If you enable this policy setting, PowerPoint does not automatically extend the display when users present on a laptop or tablet computer. In addition, the "Automatically extend display when presenting on a laptop or tablet" checkbox on the user interface (UI) under File | Options | Advanced | Display is unchecked.
If you disable or do not configure this policy setting, PowerPoint automatically extends the display when users present on a laptop or tablet computer. Users can change this behavior by unchecking the "Automatically extend display when presenting on a laptop or tablet" checkbox on the UI under File | Options | Advanced | DisplayDisplay enterprise themesOnly show enterprise themesEnterprise themes category titleThis policy allows you to display enterprise themes in the ribbon galleries. You can also name the category for the themes, and you can hide all the Office in-box and connected gallery themes.List of external file format converters to customize.ppt.pps.pot.ppsx.potx.pptx.ppsm.pptm.potmEnable save AutoRecover infoAutoRecover save frequency (minutes):%USERPROFILE%\Application Data\Microsoft\PowerPointSave PowerPoint files asMaximum number of undosSize of recently used file listAdd slide navigation controlsColorsCipher key lengthNumber of bytesChecked: Allow edit. Unchecked: Do not allow edit.Maximum number:Maximum to preserve:File block setting:File block setting:File block setting:File block setting:File block setting:File block setting:File block setting:File block setting:File block setting:File block setting:Allow sub folders:Allow sub folders:Allow sub folders:Allow sub folders:Allow sub folders:Allow sub folders:Allow sub folders:Allow sub folders:Allow sub folders:Allow sub folders:Allow sub folders:Allow sub folders:Allow sub folders:Allow sub folders:Allow sub folders:Allow sub folders:Allow sub folders:Allow sub folders:Allow sub folders:Allow sub folders:List of error messages to customizeEnter error ID for Value Name and custom button text for ValueFile tab | Options | Customize Ribbon | All Commands | Web Page PreviewFile tab | Share | Send Using E-mailInsert tab | Links | HyperlinkReview tab | Language | LanguageDeveloper tab | Code | MacrosDeveloper tab | Code | Macro SecurityDeveloper tab | Code | Visual BasicFile tab | Options | Customize Ribbon | All Commands | Address
Slide Show tab | Start Slide Show | Broadcast Slide ShowCtrl+F (Home | Editing | Find)Ctrl+K (Insert | Links | Hyperlink)Alt+F8 (Developer | Code | Macros)Alt+F11 (Developer | Code | Visual Basic)Ctrl+F5 (Slide Show | Start Slide Show | Broadcast Slide Show)Enter a command bar ID to disableEnter a key and modifier to disableList of managed add-insOnly show enterprise themes