How Can We Help?
Securing systems against malicious macros
The following table displays the security benefit, business impact and implementation difficulty of different approaches to managing macros in Microsoft Office files.
Approach | Security Benefit | Business Impact | Implementation Difficulty |
All macros are disabled | Very high | High | Low |
Only macros from trusted locations are enabled | High | High | Medium |
Only macros digitally signed by trusted publishers are enabled | High | Medium | High |
Users decide which macros to enable on a case-by-case basis | Low | Low | Low |
All macros are enabled | None | None | Low |