Securing systems against malicious macros
The following table displays the security benefit, business impact and implementation difficulty of different approaches to managing macros in Microsoft Office files.
|Approach||Security Benefit||Business Impact||Implementation Difficulty|
|All macros are disabled||Very high||High||Low|
|Only macros from trusted locations are enabled||High||High||Medium|
|Only macros digitally signed by trusted publishers are enabled||High||Medium||High|
|Users decide which macros to enable on a case-by-case basis||Low||Low||Low|
|All macros are enabled||None||None||Low|