Table of Contents

Securing systems against malicious macros

You are here:
< All Topics

The following table displays the security benefit, business impact and implementation difficulty of different approaches to managing macros in Microsoft Office files.

ApproachSecurity BenefitBusiness ImpactImplementation Difficulty
All macros are disabledVery highHighLow
Only macros from trusted locations are enabledHighHighMedium
Only macros digitally signed by trusted publishers are enabledHighMediumHigh
Users decide which macros to enable on a case-by-case basisLowLowLow
All macros are enabledNoneNoneLow
Categories