Microsoft Outlook Macros - Novell ZENWORKS NETWORK ACCESS CONTROL 5.0 - 09-22-2008 User Manual

Table of Contents

Advertisement

How Does this Affect Me?
Macros are simple programs that are used to repeat commands and keystrokes within another
program. A macro can be invoked (run) with a simple command that you assign, such as
[ctrl]+[shift]+[r]. Some viruses are macro viruses and are hidden within a document. When you
open an infected document, the macro virus runs. A macro virus can save itself to other files (such
as the Normal template) and can potentially infect all of your files. If a user on another computer
opens the infected file, the virus can spread to their computer as well.
What Do I Need to Do?
Set the Microsoft Excel macro security level as follows:
1 Open Excel.
2 Select Tools>>Macro>>Security>>Security Level tab.
3 Select High, Medium, or Low.
4 Click ok.
B.4.3 Microsoft Outlook Macros
The following sections contain more information:
"Description" on page 420
"Test Properties" on page 420
"How Does this Affect Me?" on page 421
"What Do I Need to Do?" on page 421
Description
This test verifies that the endpoint attempting to connect to your system has the Microsoft Outlook
macro security level specified by your security standards.
Test Properties
Select the minimum Microsoft Outlook macro setting for that is required in order for an endpoint to
connect to your network.
Very High . Only macros installed in trusted locations will be allowed to run. All other signed
and unsigned macros are disabled.
High . Only signed macros from trusted sources will be allowed to run. Unsigned macros are
automatically disabled
Medium . You can choose whether or not to run potentially unsafe macros.
Low . (not recommended). You are not protected from potentially unsafe macros. Use this
setting only if you have virus scanning software installed, or you have checked the safety of all
documents you open.
420 Novell ZENworks Network Access Control Users Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zenworks network access control 5.0

Table of Contents