Office2016 How to set up a tutorial to prevent malware attack operations
The latest news is that Microsoft has finally introduced an important security feature for Office 2016 that can be used to keep away from macro malware attacks. For years, the "macro virus" has been a mishap in the Office suite. Despite the convenience of macro operations, there are still a lot of attackers who look at it and believe that many people have seen "macros" in Word, Excel, and PowerPoint. Typically, attackers will spread through spam messages.
After successful spoofing and running permissions, some macro malware attempts to contact a remote server and load various types of malicious content, such as spyware, adware, and even extortion software.
Microsoft has announced a new feature in Office 2016 that allows system administrators to block unreliable macro files (most of which are configured to require Internet access).
After the network administrator installs Office software Office 2016 and configures the protection, the user tries to enable the file macros and then sees the red warning bar for content blocking.
Office2016 settings to prevent malicious software attacks from operating steps:
(1) Download Office 2016 admin template Files (admx/adml) and Office customization tools from Microsoft website;
(2) Open Group Policy Manager, click ' Start '-> ' Control Panel '-> ' admin tool '-> ' Group Policy Management ';
(3) Locate and right click on the ' Group Policy object ' that needs to be configured for editing;
(4) Select ' Group Policy Management Editor '-> ' User Configuration ' (as shown in the figure above);
(5) Select ' admin templates '-> ' Microsoft word 2016 '-> ' Word Options '-> ' security '-> ' Trust Center ';
(6) Open the ' organization needs to connect to the Internet Run Office macro file ' option to configure and enable