Microsoft improves Office security by blocking default VBA macros

There has been some back and forth since the change was originally announced, but this week Microsoft started rolling out an update to Microsoft Office that blocks the use of Visual Basic for Applications (VBA) macros on downloaded documents.

Last month, Microsft was testing the new default when it suddenly rolled back the update, “temporarily while we make some additional changes to improve usability.” Despite saying it was temporary, many experts feared Microsoft wouldn’t go through with changing the default setting, leaving systems vulnerable to attacks. Google Threat Analysis Group Leader Shane Huntley tweeted“Blocking Office macros would do infinitely more to actually defend against real threats than any threat intelligence blog post.”

Now the new default setting is being rolled out, but with updated language to warn users and administrators what options they have when they try to open a file and it is blocked. This only applies if Windows, using the NTFS file system, marks it as downloaded from the internet and not as a network drive or site that administrators have marked as safe, and it doesn’t change anything on other platforms like Mac, Office on Android/ iOS or Office on the web.


We resume the rollout of this change in Current Channel. Based on our assessment of customer feedback, we’ve made updates to both our end users and our IT admin documentation to clarify the options you have for different scenarios. For example, what to do if you have files on SharePoint or files on a network share. Refer to the following documentation:

• For end users, A potentially dangerous macro has been blocked

• For IT administrators, Macros from the internet is blocked by default in Office

If you ever get the Block macros from running in Office files from the web policy, this change will not affect your organization.

While some people use the scripts to automate tasks, hackers have abused the feature for years with malicious macros, causing people to download a file and run it to compromise their systems. Microsoft noted how administrators could use Group Policy settings in Office 2016 to block macros in their organization’s systems. Still, not everyone turned it on and the attacks continued, allowing hackers to steal data or spread ransomware.

Users who try to open files and are blocked will get a popup send them to this page, explaining why they probably don’t need to open that document. It starts by going through different scenarios where someone could try to trick them into running malware. If they really need to see what’s in the downloaded file, it explains ways to access it, all of which are more complicated than what happened before, where users could usually enable macros by pressing one button in the warning banner.

This change may not always stop someone from opening a malicious file, but it does provide multiple layers of warning before they can get there, while still allowing access to the people who say they absolutely need it.

Similar Posts