Helping users stay safe: Blocking internet macros by default in Office (2024)

Updated July 20, 2022:

We’re resuming the rollout of this change in Current Channel. Based on our review of customer feedback, we’ve made updates to both our end user and our IT admin documentation to make clearer what options you have for different scenarios. For example, what to do if you have files on SharePoint or files on a network share. Please refer to the following documentation:

For end users,A potentially dangerous macro has been blocked

For IT admins,Macros from the internet will be blocked by default in Office

If you ever enabled or disabled theBlock macros from running in Office files from the Internetpolicy, your organization will not be affected by this change.

Update July 8, 2022:

Following user feedback,we have rolled back this change temporarily while we make some additional changes to enhance usability. This is a temporary change,and we are fully committed to making the default change for all users.

Regardless of the default setting, customers can block internet macros through the Group Policy settings described in this article.

We will provide additional details on timeline in the upcoming weeks.

It’s a challenging time in software security; migration to the modern cloud, the largest number of remote workers ever, and a global pandemic impacting staffing and supply chains all contribute to changes in organizations. Unfortunately, these changes also give bad actors opportunities to exploit organizations:

“Cybercriminals are targeting and attacking all sectors of critical infrastructure, including healthcare and public health, information technology (IT), financial services, and energy sectors. Ransomware attacks are increasingly successful, crippling governments and businesses, and the profits from these attacks are soaring.”

- Microsoft Digital Defense Report, Oct 2021

For years Microsoft Office has shipped powerful automation capabilities called active content, the most common kind are macros. While we provided a notification bar to warn users about these macros, users could still decide to enable the macros by clicking a button. Bad actors send macros in Office files to end users who unknowingly enable them, malicious payloads are delivered, and the impact can be severe including malware, compromised identity, data loss, and remote access. See more in this blog post.

"A wide range of threat actors continue to target our customers by sending documents and luring them into enabling malicious macro code. Usually, the malicious code is part of a document that originates from the internet (email attachment, link, internet download, etc.). Once enabled, the malicious code gains access to the identity, documents, and network of the person who enabled it."

- Tom Gallagher, Partner Group Engineering Manager, Office Security

For the protection of our customers, we need to make it more difficult to enable macros in files obtained from the internet.

Changing Default Behavior


We’re introducing a default change for five Office apps that run macros:

VBA macros obtained from the internet will now be blocked by default.

For macros in files obtained from the internet, users will no longer be able to enable content with a click of a button. A message bar will appear for users notifying them with a button to learn more. The default is more secure and is expected to keep more users safe including home users and information workers in managed organizations.

"We will continue to adjust our user experience for macros, as we’ve done here, to make it more difficult to trick users into running malicious code via social engineering while maintaining a path for legitimate macros to be enabled where appropriate via Trusted Publishers and/or Trusted Locations.”

- Tristan Davis, Partner Group Program Manager, Office Platform

This change only affects Office on devices running Windows and only affects the following applications: Access, Excel, PowerPoint, Visio, and Word. The change will begin rolling out in Version 2203, starting with Current Channel (Preview) in early April 2022. Later, the change will be available in the other update channels, such as Current Channel, Monthly Enterprise Channel, and Semi-Annual Enterprise Channel.

At a future date to be determined, we also plan to make this change to Office LTSC, Office 2021, Office 2019, Office 2016, and Office 2013.

End User Experience


Once a user opens an attachment or downloads from the internet an untrusted Office file containing macros, a message bar displays a Security Risk that the file contains Visual Basic for Applications (VBA) macros obtained from the internet with a Learn More button.

Helping users stay safe: Blocking internet macros by default in Office (1)A message bar displays a Security Risk showing blocked VBA macros from the internet

The Learn More button goes to an article for end users and information workers that contains information about the security risk of bad actors using macros, safe practices to prevent phishing & malware, and instructions on how to enable these macros by saving the file and removing the Mark of the Web (MOTW).

What is Mark of the Web (MOTW)?


The MOTW is an attribute added to files by Windows when it is sourced from an untrusted location (Internet or Restricted Zone). The files must be saved to a NTFS file system, the MOTW is not added to files on FAT32 formatted devices.

IT Administrator Options

This chart shows the evaluation flow for Office files with VBA macros and MOTW:

Helping users stay safe: Blocking internet macros by default in Office (2)Evaluation flow for Office files with VBA macros and MOTW


Organizations can use the “Block macros from running in Office files from the Internet” policy to prevent users from inadvertently opening files from the internet that contain macros. Microsoft recommends enabling this policy, and if you do enable it, your organization won’t be affected by this default change.

“Setting policy is a powerful tool for IT Admins to protect their organizations. For years we’ve recommended blocking macros obtained from the internet in our security baselines, and many customers have done so. I’m pleased Microsoft is taking the next step to securing everyone with this policy by default!”

- Hani Saliba, Partner Director of Engineering, Office Calc

Additionally, there are two other options to know your files are safe:

  • Opening files from a Trusted Location
  • Opening files with digitally signed macros and providing the certificate to the user, who then installs it as a Trusted Publisher on their local machine


To learn more about how to get ready for this change and recommendations for managing VBA macros in Office files, read this article for Office admins.

Thank you,

Office Product Group
VBA Team& Office Security Team

More helpful information on the threats of Ransomware:

  • The growing threat of ransomware, Microsoft "On the Issues" blog post on July 20, 2021
  • Rapidly protect against ransomware and extortion
  • 2021 Microsoft Digital Defense Report(see pages 10-19)
  • Learn about threat analytics in Microsoft 365 Defender
  • Microsoft’s DART ransomware approach and best practices
  • Microsoft DART ransomware case study

Continue the conversation by joining us in the Microsoft 365 Tech Community! Whether you have product questions or just want to stay informed with the latest updates on new releases, tools, and blogs, Microsoft 365 Tech Community is your go-to resource to stay connected!

Helping users stay safe: Blocking internet macros by default in Office (2024)

FAQs

Helping users stay safe: Blocking internet macros by default in Office? ›

We're introducing a default change for five Office apps that run macros: VBA macros obtained from the internet will now be blocked by default. For macros in files obtained from the internet, users will no longer be able to enable content with a click of a button.

How do I block macros by default in Office? ›

For a long time, threat actors have used malicious Microsoft Office macros to get a hook inside of their target's computers. It was for that reason that, in 2022, Microsoft finally — though unevenly — began blocking macros by default on files downloaded from the Internet.

How do I stop Microsoft from blocking macros in Access? ›

- Select Options at the bottom of the left bar. - In the left-side pane, choose Trust Center, and then click Trust Center Settings. - In the Trust Center dialog box, click Macro Settings on the left. - Select "Enable all macros" and click OK.

Why is Microsoft blocking macros? ›

VBA Macro Notification Settings

This policy prevents users from being lured into enabling malicious macros. By default, Office is configured to block files that contain VBA macros and display a Trust Bar with a warning that macros are present and have been disabled.

How do I enable macros by default? ›

When you're ready to apply the settings, follow these six steps for enabling macros in Excel permanently:
  1. Open your Excel file. ...
  2. Find the Trust Center. ...
  3. Navigate to "Macro Settings." Upon opening the Trust Center, you can see settings to keep your documents safe and maintain the security of your data. ...
  4. Enable all macros.

How many ways are there by default to stop a macro? ›

If you have selected to display the Running icon when a macro is running, right mouse click on the icon in the notification area to stop the macro. Or you may press the default shortcut of the Windows key plus the End key to stop the macro.

How do I stop all macros in access? ›

You can use a conditional expression in the macro's action row that contains this action. When the expression evaluates to True (–1), Access stops all macros.

Why are macros a security risk? ›

Malicious macros can do almost anything that other malware can do to your system, including emulating ransomware, stealing data, and emailing itself out to your contacts.

What is the best practice for avoiding potentially malicious macros? ›

Limit macro execution: Restricting macro execution to trusted locations or digitally signed macros can significantly reduce the risk of unauthorized or malicious macros running on users' systems. This can be achieved through Group Policy settings or by implementing digital signatures for trusted macros.

How do I remove macro protection in Excel? ›

You can also access the Trust Center in Excel Options. To do that, click Options, and then click Trust Center > Trust Center Settings > Macro Settings. For more information about macro security, see the following topics: Add, remove, or change a trusted location.

How to fix macro issues in Excel? ›

Re: macro problem in excel

Ensure the macros are saved in the workbook and try reopening it. Check for any filtering or sorting in the macro list, and if the problem persists, consider exporting the macros, creating a new workbook, and importing them back in.

How do I unblock macros in Access? ›

Step 1 – Launch MS Access. Click on “Options”: Step 2 – Click on “Trust Center”, then on “Trust Center Settings”, “Macro settings”, select “Enable all macros” and click OK: Step 3 – Exit MS Access.

How do I disable macros in Office 365? ›

How to disable macros in Excel
  1. In your Excel, click the File tab > Options.
  2. On the left-side pane, select Trust Center, and then click Trust Center Settings… .
  3. In the left menu, select Macro Settings, choose Disable all macros without notification, and click OK.
Mar 28, 2023

How do I restrict to run a macro automatically when starting Excel? ›

- Hold down the SHIFT key on your keyboard while Excel is starting up. - Continue holding the SHIFT key until Excel finishes loading. By holding down the SHIFT key during startup, you can disable any macros that are set to run automatically.

How do I restrict macros? ›

Change macro settings in the Trust Center
  1. Select the File tab and choose Options.
  2. Select Trust Center, and then choose Trust Center Settings.
  3. In the Trust Center, select Macro Settings. ...
  4. Make the selections that you want, then select OK.

Top Articles
Latest Posts
Article information

Author: Nathanael Baumbach

Last Updated:

Views: 5626

Rating: 4.4 / 5 (55 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Nathanael Baumbach

Birthday: 1998-12-02

Address: Apt. 829 751 Glover View, West Orlando, IN 22436

Phone: +901025288581

Job: Internal IT Coordinator

Hobby: Gunsmithing, Motor sports, Flying, Skiing, Hooping, Lego building, Ice skating

Introduction: My name is Nathanael Baumbach, I am a fantastic, nice, victorious, brave, healthy, cute, glorious person who loves writing and wants to share my knowledge and understanding with you.