Trusted Locations for Office files - Microsoft 365 Apps (2024)

  • Article

Applies to: Microsoft 365 Apps, Office LTSC 2021, Office 2019, and Office 2016

Trusted Locations is a feature of Office where files contained in these folders are assumed safe, such as files you create yourself or saved from a trustworthy source. These files bypass threat protection services, bypass file block settings, and all active content is enabled. This means files saved in Trusted Locations aren't opened in Protected View or Application Guard.

Active content can include unsigned add-ins, VBA macros, connections to external data and more. Ensure you trust the original source of the file before saving it to a Trusted Location. It's important as all active content is enabled, and users don't receive notifications about potential security risks. The following diagram shows the trust workflow for opening Office files.

Trusted Locations for Office files - Microsoft 365 Apps (1)

As shown in Step 2, files in Trusted Locations bypass all other security and policy checks. Therefore, Trusted Locations should be used rarely, for unique situations and only for select users. In the security baseline for Microsoft 365 Apps for enterprise, the guidance is to disable network-based Trusted Locations. Then, if needed, control Trusted Locations centrally through policy and don't allow users to set Trusted Locations themselves.

Planning steps for Trusted Locations

Trusted Locations enable all content within a file, including add-ins, ActiveX controls, hyperlinks, links to data sources and media, and VBA macros. Files that are opened from Trusted Locations skip file validation checks, File Block checks, and don't open in Protected View or Application Guard. There are different levels of trust you can allow in your organization for Trusted Locations:

  • Allow end users to create Trusted Locations on their device or network themselves
  • Use policy to prevent users from creating Trusted Locations
  • Use policy to centrally manage Trusted Locations
  • Disable Trusted Locations

It’s important to choose the scenarios that are best for your organization and its security risk tolerance.

Note

Some Trusted Locations are created by default when Office is installed. For a list of those Trusted Locations, see Default Trusted Locations for Office apps.

To implement Trusted Locations, you must determine:

  • The Office apps for which you want to configure Trusted Locations.
  • The folders that you want to designate as Trusted Locations.
  • The folder sharing and folder security settings that you want to apply to your Trusted Locations.
  • The restrictions that you want to apply to Trusted Locations.

Determine the Office apps for which you want to configure Trusted Locations

You can view the list of Trusted Locations by going to File > Options > Trust Center > Trust Center Settings... > Trusted Locations in the following Office apps:

  • Access
  • Excel
  • PowerPoint
  • Visio
  • Word

Policies are available to manage Trusted Locations for each of these Office apps. For more information, see Use policy to manage Trusted Locations.

Note

Policies are also available for Project, but Project doesn't have Trusted Locations settings in the Trust Center.

Determine the folders to designate as Trusted Locations

Here are some considerations to keep in mind when determining which folders to use as Trusted Locations:

  • Unless blocked by policy, users can create and modify Trusted Locations in the Trust Center for their Office app. For more information, see Add, remove, or change a trusted location.

  • By default, only Trusted Locations local to the user's device are allowed. Network locations can also be set as a Trusted Location, but not recommended.

  • We don't recommend that users specify root folders as Trusted Locations. For example, the C: drive or the My Documents folder. Instead, create a subfolder within those folders and specify only that folder as a Trusted Location.

  • One or more applications can use the same Trusted Location.

  • You can use the Trusted Location #1 policy to designate Trusted Locations for your users.

Determine folder sharing and folder security settings for Trusted Location folders

All folders that you specify as Trusted Locations must be secured to prevent malicious users from adding or modifying files in a Trusted Location.

If a folder is shared, configure sharing permissions so that only authorized users have access to the shared folder.

Be sure to use the principle of least privilege and grant permissions that are appropriate to a user. Grant Read permission to users who don't need to modify files in Trusted Locations. Give Full Control permission to users who must edit files.

Use policy to manage Trusted Locations

There are several policies that you can use to manage Trusted Locations in your organization.

  • Trusted Location #1
  • Allow Trusted Locations on the network
  • Disable all trusted locations

You can use Cloud Policy, the Microsoft Intune admin center, or the Group Policy Management Console to configure and deploy policy settings to users in your organization. For more information, see Tools available to manage policies.

Note

For volume licensed versions of Office 2016, such as Office Professional Plus 2016, you can use the Office Customization Tool (OCT) to configure Trusted Locations. For more information, see Office Customization Tool (OCT) 2016 Help: Office security settings.

There are separate policies for Trusted Locations for each Office application. The following table shows where each policy can be found in the Group Policy Management Console under User Configuration\Policies\Administrative Templates.

ApplicationPolicy location
AccessMicrosoft Access 2016\Application Settings\Security\Trust Center\Trusted Locations
ExcelMicrosoft Excel 2016\Excel Options\Security\Trust Center\Trusted Locations
PowerPointMicrosoft PowerPoint 2016\PowerPoint Options\Security\Trust Center\Trusted Locations
ProjectMicrosoft Project 2016\Project Options\Security\Trust Center
VisioMicrosoft Visio 2016\Visio Options\Security\Trust Center
WordMicrosoft Word 2016\Word Options\Security\Trust Center\Trusted Locations

Configure the Allow mix of policy and user locations policy to determine whether both users and admins, or only admins, can define Trusted Locations.

"Trusted Location #1" policy

You can use this policy to specify the path for a Trusted Location for users in your organization. There are 20 instances of this policy. For example, Trusted Location #1, Trusted Location #2, Trusted Location #3, etc.

By default, these policies are blank. To add a Trusted Location, enable the policy and specify the path to the Trusted Location. Make sure that the location that you specify is secured, by setting permissions so that only the appropriate users can add Office files to that location.

Trusted Locations that you specify with this policy appear under the Policy Locations section under File > Options > Trust Center > Trust Center Settings... > Trusted Locations.

Note

  • You can use environment variables when specifying a Trusted Location.
  • These 20 policies are also available under User Configuration\Policies\Administrative Templates\Microsoft Office 2016\Security Settings\Trust Center. If you use this version of the policy, the policy applies to all the apps that support Trusted Locations.

"Allow Trusted Locations on the network" policy

This policy controls whether Trusted Locations on the network can be used.

By default, Trusted Locations on network locations are disabled. But users can change this setting by going to File > Options > Trust Center > Trust Center Settings... > Trusted Locations and selecting the Allow Trusted Locations on my network (not recommended) checkbox.

Which state you choose for the policy determines the level of protection you're providing. The following table shows the level of protection you get with each state.

IconProtection levelPolicy stateDescription
Trusted Locations for Office files - Microsoft 365 Apps (2)Protected [recommended]DisabledBlocks Trusted Locations on network locations, including any configured by the admin (for example, by using the "Trusted Location #1" policy). Ignores any network locations set by users as Trusted Locations in the Trust Center, and prevents users from adding more.
Trusted Locations for Office files - Microsoft 365 Apps (3)Not protectedEnabledAllows network locations as Trusted Locations to be set both by users and by policy.
Trusted Locations for Office files - Microsoft 365 Apps (4)Partially protectedNot ConfiguredBy default, users are blocked from adding network locations as Trusted Locations, but could enable this setting by selecting the Allow Trusted Locations on my network (not recommended) checkbox in the Trust Center

We recommend setting this policy to Disabled as part of the security baseline for Microsoft 365 Apps for enterprise. You should disable this policy for most users and only make exceptions for certain users as needed.

You can specify web folders as Trusted Locations. But only those web folders that support Web Distributed Authoring and Versioning (WebDAV) or FrontPage Server Extensions Remote Procedure Call (FPRPC) protocols are recognized as Trusted Locations.

"Disable all trusted locations" policy

This policy can be used to disable all Trusted Locations.

By default, Trusted Locations are available, and users can designate any location as a Trusted Location and a device can have any combination of user-created and admin-configured Trusted Locations.

Which state you choose for the policy determines the level of protection you're providing. The following table shows the level of protection you get with each state.

IconProtection levelPolicy stateDescription
Trusted Locations for Office files - Microsoft 365 Apps (5)ProtectedEnabledAll Trusted Locations are blocked.
Trusted Locations for Office files - Microsoft 365 Apps (6)Not protectedDisabledA user or device can have a combination of Trusted Locations created by the user or configured by the admin (for example, by policy).
Trusted Locations for Office files - Microsoft 365 Apps (7)Not protectedNot ConfiguredThis setting is the Office default. Provides the same behavior as Disabled.

Organizations that have a highly restrictive security environment typically set this policy to Enabled.

"Allow mix of policy and user locations" policy

This policy controls whether Trusted Locations can be defined by users and by admins (for example, by policy), or if Trusted Locations can only be defined by policy.

This policy can be found under User Configuration\Policies\Administrative Templates\Microsoft Office 2016\Security Settings\Trust Center in the Group Policy Management Console.

Which state you choose for the policy determines the level of protection you're providing. The following table shows the level of protection you get with each state.

IconProtection levelPolicy stateDescription
Trusted Locations for Office files - Microsoft 365 Apps (8)Protected [recommended]DisabledOnly Trusted Locations defined by policy are allowed.
Trusted Locations for Office files - Microsoft 365 Apps (9)Not protectedEnabledA user or device can have a combination of Trusted Locations created by the user or configured by the admin (for example, by policy).
Trusted Locations for Office files - Microsoft 365 Apps (10)Not protectedNot ConfiguredThis setting is the Office default. Provides the same behavior as Enabled.

We recommend setting this policy to Disabled as part of the security baseline for Microsoft 365 Apps for enterprise. You should disable this policy for most users and only make exceptions for certain users as needed.

Default Trusted Locations for Office apps

Several folders are designated as default Trusted Locations in an installation of Office. The default Trusted Locations are listed in tables for the following applications.

  • Access
  • Excel
  • PowerPoint
  • Word

There are no default Trusted Locations for Project or for Visio.

You can see these folders by going to File > Options > Trust Center > Trust Center Settings... > Trusted Locations.

Default Trusted Locations for Access

The following table lists the default Trusted Locations for Access and whether the subfolders are also trusted.

Default trusted locationFolder descriptionSubfolders trusted?
Program Files\Microsoft Office\Root\Office16\ACCWIZWizard databasesNo (Disallowed)

Default Trusted Locations for Excel

The following table lists which folders are the default Trusted Locations for Excel and whether the subfolders are also trusted.

Default trusted locationsFolder descriptionSubfolders trusted?
Program Files\Microsoft Office\Root\TemplatesApplication templatesYes (Allowed)
Users\user_name\Appdata\Roaming\Microsoft\TemplatesUser templatesNo (Disallowed)
Program Files\Microsoft Office\Root\Office16\XLSTARTExcel startupYes (Allowed)
Users\user_name\Appdata\Roaming\Microsoft\Excel\XLSTARTUser startupNo (Disallowed)
Program Files\Microsoft Office\Root\Office16\STARTUPOffice startupYes (Allowed)
Program Files\Microsoft Office\Root\Office16\LibraryAdd-insYes (Allowed)

Default Trusted Locations for PowerPoint

The following table lists the default Trusted Locations for PowerPoint and whether the subfolders are also trusted.

Default trusted locationsFolder descriptionSubfolders trusted?
Program Files\Microsoft Office\Root\TemplatesApplication templatesYes (Allowed)
Users\user_name\Appdata\Roaming\Microsoft\TemplatesUser templatesYes (Allowed)
Users\user_name\Appdata\Roaming\Microsoft\AddinsAdd-insNo (Disallowed)
Program Files\Microsoft Office\Root\Document Themes 16Application themesYes (Allowed)

Default Trusted Locations for Word

The following table lists the default Trusted Locations for Word and whether the subfolders are also trusted.

Default trusted locationsFolder descriptionSubfolders trusted?
Program Files\Microsoft Office\Root\TemplatesApplication templatesYes (Allowed)
Users\user_name\Appdata\Roaming\Microsoft\TemplatesUser templatesNo (Disallowed)
Users\user_name\Appdata\Roaming\Microsoft\Word\StartupUser startupNo (Disallowed)
Trusted Locations for Office files - Microsoft 365 Apps (2024)
Top Articles
iPhones With The Best Camera: Price & Key Specifications
What is Password Vaulting? | Definition | StrongDM
Toa Guide Osrs
Public Opinion Obituaries Chambersburg Pa
Craigslist Home Health Care Jobs
Roblox Roguelike
Melson Funeral Services Obituaries
Mcfarland Usa 123Movies
1970 Chevelle Ss For Sale Craigslist
Phone Number For Walmart Automotive Department
La connexion à Mon Compte
The Realcaca Girl Leaked
35105N Sap 5 50 W Nit
Pike County Buy Sale And Trade
World of White Sturgeon Caviar: Origins, Taste & Culinary Uses
A.e.a.o.n.m.s
Gas Station Drive Thru Car Wash Near Me
Hair Love Salon Bradley Beach
Rainfall Map Oklahoma
What is Cyber Big Game Hunting? - CrowdStrike
Craigslist Malone New York
Condogames Xyz Discord
Lancasterfire Live Incidents
Hennens Chattanooga Dress Code
Ahrefs Koopje
Robin D Bullock Family Photos
Bernie Platt, former Cherry Hill mayor and funeral home magnate, has died at 90
Rimworld Prison Break
Chase Bank Pensacola Fl
Sec Baseball Tournament Score
BJ 이름 찾는다 꼭 도와줘라 | 짤방 | 일베저장소
What Equals 16
Royalfh Obituaries Home
Dreamcargiveaways
Craigslist Ludington Michigan
Gyeon Jahee
Royals op zondag - "Een advertentie voor Center Parcs" of wat moeten we denken van de laatste video van prinses Kate?
Hindilinks4U Bollywood Action Movies
Craigslist Pets Plattsburgh Ny
Craigslist Freeport Illinois
Emily Tosta Butt
5A Division 1 Playoff Bracket
Ds Cuts Saugus
Unveiling Gali_gool Leaks: Discoveries And Insights
844 386 9815
Timothy Warren Cobb Obituary
10 Types of Funeral Services, Ceremonies, and Events » US Urns Online
The Cutest Photos of Enrique Iglesias and Anna Kournikova with Their Three Kids
News & Events | Pi Recordings
How to Find Mugshots: 11 Steps (with Pictures) - wikiHow
Festival Gas Rewards Log In
Jesus Calling Oct 6
Latest Posts
Article information

Author: Trent Wehner

Last Updated:

Views: 5995

Rating: 4.6 / 5 (76 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Trent Wehner

Birthday: 1993-03-14

Address: 872 Kevin Squares, New Codyville, AK 01785-0416

Phone: +18698800304764

Job: Senior Farming Developer

Hobby: Paintball, Calligraphy, Hunting, Flying disc, Lapidary, Rafting, Inline skating

Introduction: My name is Trent Wehner, I am a talented, brainy, zealous, light, funny, gleaming, attractive person who loves writing and wants to share my knowledge and understanding with you.