![]() However, now, it is making the process much more difficult by replacing that option with a "Learn More" prompt. While Microsoft already used to disable Macros, enabling it was easy before as all you had to do was click on the "Enable Content" option. Therefore, to help improve security in Office, we’re changing the default behavior of Office applications to block macros in files from the internet. VBA macros are a common way for malicious actors to gain access to deploy malware and ransomware. ![]() For example, last year, we covered a story where a malicious "made on Windows 11" document was found using VBA macros to infect systems. To block these potentially harmful files since Macros are often used to distribute malware. The rationale is pretty much the same here. This change will affect Access, Excel, PowerPoint, Visio, and Word files. Less than a week ago, the Redmond firm announced that it disabled MSIX AppX app-installers, and earlier today, hot on the heels of the announcement that it is restricting XLM macros last month, the company declared that it is also going to block Visual Basic for Applications (VBA) Macros in Office files obtained from the internet by default. It looks like Microsoft is on a roll to block all sorts of ways and methods using which malware can infect a user's system.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |