- Jul 3, 2015
- 8,153
Office 2016 Standard. It says there are macros in the document, but the "document" is the .dotm add-on files in STARTUP folderWhat version of MS Office you have and what is the error alert?
Office 2016 Standard. It says there are macros in the document, but the "document" is the .dotm add-on files in STARTUP folderWhat version of MS Office you have and what is the error alert?
Delete the below value (VBAOFF), or set the value to 0:Office 2016 Standard. It says there are macros in the document, but the "document" is the .dotm add-on files in STARTUP folder
I don't seem to have the registry key in that place, and when I searched registry for VBAOFF I didn't find anything.Delete the below value (VBAOFF), or set the value to 0:
[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Office\16.0\Common]
"VBAOFF"=dword:00000001
This mitigation disables VBA interpreter system-wide for all MS Office applications. If you unblock VBA, then you will be able to control the execution of macros in MS Office applications.
The above will be possible also in the next Hard_Configurator version (thanks to you).
Wait, I think I know the problem. This registry key is created only when I have <Documents Anti-Exploit> = ON ?Strange. Do you have <Documents Anti-Exploit> = ON ?
Is the issue still present when <Documents Anti-Exploit> = OFF ?
Just saw your post. Now I will try "off" and see if that helps.Hard_Configurator writes to the Registry only one macro-related key:
[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Office\16.0\Common]
"VBAOFF"=dword:00000001
If changing <Documents Anti-Exploit> to OFF did not work, then probably some other program made changes related to macros. SysHardener uses another key:
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Word\Security]
"VBAWarnings"=dword:00000001
Nope, that didn't do it. I enabled the setting, but I don't see that registry key. See screenshots.
Duh!! Now it worked. I deleted the key. The anti-exploit setting now says "partial", and I can use Word normally.This is not the right key!!! You missed Policies.
This is a very strong protection. It disables totally the macros in all MS Office applications. It is also in HKLM Registry hive, so cannot be reverted by non-elevated malware/exploit. WD ASR is also strong, but macros can still be run. If one would try to compare VBA to PowerShell, then ASR is on the level of Constrained Language Mode and VBAOFF is like blocking System.Management.Automation.dll.Duh!! Now it worked. I deleted the key. The anti-exploit setting now says "partial", and I can use Word normally.
What protection does this give me, if I am not using WD?
Cool, thanksThis is a very strong protection. It disables totally the macros in all MS Office applications. It is also in HKLM Registry hive, so cannot be reverted by non-elevated malware/exploit. WD ASR is also strong, but macros can still be run. If one would try to compare VBA to PowerShell, then ASR is on the level of Constrained Language Mode and VBAOFF is like blocking System.Management.Automation.dll.
Do you use standard (limited) user account? It's part of the SRP ecosystem. SRP doesn't do much to stop elevated processes, so you want to keep the bad ones from elevating.I’m considering switching to H_C when I change my configuration. It’s evolved enough and possibly I have as well.
What this app does:
Do you use standard (limited) user account? It's part of the SRP ecosystem. SRP doesn't do much to stop elevated processes, so you want to keep the bad ones from elevating.
Generally, SUA is much safer than Admin Account. But, when using Hard_Configurato default-deny setup, the difference is less important.I’m considering switching to H_C when I change my configuration. It’s evolved enough and possibly I have as well.
Do you use standard (limited) user account? It's part of the SRP ecosystem. SRP doesn't do much to stop elevated processes, so you want to keep the bad ones from elevating.
Do you use some applications installed outside of Program Files (except OneDrive)?Yes. SUA.