{"id":270310,"date":"2022-07-08T07:21:01","date_gmt":"2022-07-08T05:21:01","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=270310"},"modified":"2022-07-08T07:42:03","modified_gmt":"2022-07-08T05:42:03","slug":"microsoft-will-standardmig-nun-doch-keine-makros-in-office-blockieren","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2022\/07\/08\/microsoft-will-standardmig-nun-doch-keine-makros-in-office-blockieren\/","title":{"rendered":"Microsoft will standardm&auml;&szlig;ig nun doch keine Makros in Office blockieren"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2012\/07\/Office1.jpg\" width=\"55\" height=\"60\" align=\"left\" \/>[<a href=\"https:\/\/borncity.com\/win\/2022\/07\/08\/microsoft-will-standardmig-nun-doch-keine-makros-in-office-blockieren\/\" target=\"_blank\" rel=\"noopener\">English<\/a>]Macros in Office stellen ein Einfallstor f\u00fcr Malware wie Dridex, Emotet, Trickbot, Qbot etc. dar. Microsoft hatte Pl\u00e4ne, Makros in Office 365 standardm\u00e4\u00dfig zu deaktivieren. Nun scheint diese Idee wieder kassiert worden zu sein, Makros werden auch zuk\u00fcnftig nicht standardm\u00e4\u00dfig in Office blockiert. Das geht jedenfalls aus mageren Verlautbarungen Microsofts hervor.<\/p>\n<p><!--more--><\/p>\n<h2>Roadmap zum Blockieren von Macros<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg04.met.vgwort.de\/na\/e0fea1e20a3a4b83a5dc1a999e581109\" alt=\"\" width=\"1\" height=\"1\" \/>Es gibt von Microsoft eine alte <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/roadmap?rtc=1&amp;searchterms=88883&amp;filters=&amp;searchterms=88883\" target=\"_blank\" rel=\"noopener\">Office-Roadmap<\/a>, die sich mit dem Thema befasst. Nachfolgender Screenshot zeigt noch die Ank\u00fcndigung vom 8. Februar 2022. Dort hei\u00dft es, dass man aus Sicherheitsgr\u00fcnden das Verhalten von Microsoft Office zum Blockieren von Macros aus Dateien, die per Internet geladen wurden, \u00e4ndern m\u00f6chte.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/roadmap?rtc=1&amp;searchterms=88883&amp;filters=&amp;searchterms=88883\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Roadmap: Blocking VBA-Macros in Office \" src=\"https:\/\/i.imgur.com\/efjkP9E.png\" alt=\"Roadmap: Blocking VBA-Macros in Office \" \/><\/a><\/p>\n<p>Das Ganze wird n\u00e4her im Techcommunity-Beitrag <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-365-blog\/helping-users-stay-safe-blocking-internet-macros-by-default-in\/ba-p\/3071805\" target=\"_blank\" rel=\"noopener\">Helping users stay safe: Blocking internet macros by default in Office<\/a> ausgef\u00fchrt. Dort hie\u00df es im Februar 2022:<\/p>\n<blockquote><p>We're introducing a default change for five Office apps that run macros:<\/p>\n<p><strong>VBA macros obtained from the internet will now be blocked by default<\/strong><\/p>\n<p>For macros in files obtained from the internet, users will no longer be able to enable content with a click of a button. A message bar will appear for users notifying them with a button to learn more. The default is more secure and is expected to keep more users safe including home users and information workers in managed organizations.<\/p><\/blockquote>\n<p>Diese \u00c4nderung sollte nur Office auf Ger\u00e4ten mit Windows und nur die folgenden Anwendungen betreffen: Access, Excel, PowerPoint, Visio und Word. Die \u00c4nderung sollte mit der Version 2203 f\u00fcr die genannten Anwendungen, beginnend mit dem Current Channel (Preview) Anfang April 2022, eingef\u00fchrt werden. Sp\u00e4ter war diese \u00c4nderung auch in den anderen Update-Kan\u00e4len wie dem Current Channel, dem Monthly Enterprise Channel und dem Semi-Annual Enterprise Channel geplant und man wollte das sogar auf\u00a0 Office LTSC, Office 2021, Office 2019, Office 2016 und Office 2013 ausrollen.<\/p>\n<h2>R\u00fcckzieher bei Office Macro-Blockade<\/h2>\n<p>Ich hatte das Ganze nicht mitbekommen, aber die Kollegen von Bleeping Computer hatten es im Februar 2022 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-plans-to-kill-malware-delivery-via-office-macros\/\" target=\"_blank\" rel=\"noopener\">hier<\/a> angesprochen. Die obige Roadmap weist aber einen Hinweis auf eine Modifikation zum 7. Juli 2022 auf. Den Kollegen von Bleeping Computer ist dies aufgefallen und sie weisen auf <a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1545174259487621122\" target=\"_blank\" rel=\"noopener\">Twitter<\/a> sowie in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-rolls-back-decision-to-block-office-macros-by-default\/\" target=\"_blank\" rel=\"noopener\">diesem Artikel<\/a> darauf hin, dass Microsoft einen R\u00fcckzieher macht.<\/p>\n<p><a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1545174259487621122\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"No Macro blocking in Office\" src=\"https:\/\/i.imgur.com\/Ak1T1KM.png\" alt=\"No Macro blocking in Office\" \/><\/a><\/p>\n<p>Microsoft hat das wohl am 7. Juli 2022 im Microsoft 365 Message Center (unter MC393185 oder MC322553) den Kunden, die entsprechende Produkte verwalten, mitgeteilt. Bleeping Computer zitiert folgendes (ich habe keinen Zugriff auf das Microsoft 365 Message Center):<\/p>\n<blockquote><p>Based on feedback, we're rolling back this change from Current Channel. We appreciate the feedback we've received so far, and we're working to make improvements in this experience. We'll provide another update when we're ready to release again to Current Channel. Thank you.<\/p><\/blockquote>\n<p>Laut Bleeping Computer wird also das Blockieren von VBA-Macros in Office-Anwendungen, dort wo es bereits ausgerollt wurde, zur\u00fcckgenommen. Hochgesp\u00fclt wurde dies wohl am 6. Juli 2022 von einem Nutzer, der <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-365-blog\/helping-users-stay-safe-blocking-internet-macros-by-default-in\/ba-p\/3071805\/page\/2#comments:~:text=Is%20it%20just%20me%20or%20have%20Microsoft%20rolled%20this%20change%20back%20on%20the%20Current%20Channel%3F\" target=\"_blank\" rel=\"noopener\">auf Techcommunity im Ursprungsartikel nachfragte<\/a>, ob das Feature zur\u00fcckgerollt worden sei.<\/p>\n<blockquote><p><strong>Is it just me or have Microsoft rolled this change back on the Current Channel?<\/strong><\/p>\n<p>I was trying to reproduce the pinkish-red 'Security Risk&#8230; Learn More' notification in the Message Bar, in preparation for demonstrating the new default behaviour for a YouTube video I'm putting together about my company's macro-enabled toolkit.<\/p>\n<p>Created a simple .xlsm to show a MsgBox in the open event of the workbook, saved it and uploaded it to cloud storage, deleted it from my local storage, re-downloaded it from cloud storage (to a <strong>non-trusted<\/strong> location, my Downloads library)&#8230; did <strong>not<\/strong> use the Unblock checkbox on the Properties dialog to remove the mark of the web&#8230; then opened up the file.<\/p>\n<p>It first went into Protected View (expected behaviour), but then after I clicked Enable Editing, instead of getting the pink\/red message about macros being blocked altogether, I just got the old 'Security <strong>warning<\/strong>&#8230;' message with the 'Enable Content' button. The file's VBA project wasn't digitally signed, wasn't saved to a Trusted Location, and still had the mark of the web on it&#8230; so macros should have been blocked.<\/p>\n<p>I also tried uploading it and re-downloading it from our Sharepoint document library, emailing it to my work address from my personal address, opening it directly from the attachment&#8230; still macros weren't blocked entirely. Even tried downloading an .xlsm from the internet that I hadn't created (from a known trustworthy source) that my installation of Office had never encountered before, so that it definitely wasn't a Trusted Document&#8230; and STILL macros weren't blocked.<\/p>\n<p>It feels like something has undone this new default behaviour very recently&#8230; maybe Microsoft Defender is overruling the block?<\/p>\n<p>I'm loathed to clear my Trusted Documents in an effort to trigger the red macro block message, just for the sake of the video, but I'm not sure what else to try at this point.<\/p><\/blockquote>\n<p>Die Microsoft-Angestellte Angela Robertson best\u00e4tigt dann in einem <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-365-blog\/helping-users-stay-safe-blocking-internet-macros-by-default-in\/bc-p\/3566717\/highlight\/true#M4281\" target=\"_blank\" rel=\"noopener\">weiteren Kommentar<\/a>, dass die Deaktivierung von Macros, basierend auf dem Feedback, zur\u00fcckgerollt worden sei. Eine weitere Erkl\u00e4rung von Microsoft gibt es derzeit nicht. Die Nutzer sind nicht so wirklich begeistert \u00fcber die Kommunikation durch Redmond, was diesen Sachverhalt betrifft.<\/p>\n<p><strong>\u00c4hnliche Artikel:<\/strong><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/10\/09\/microsoft-deaktiviert-demnchst-excel-4-0-makros-in-office-365\/\">Microsoft deaktiviert demn\u00e4chst Excel 4.0-Makros in Office 365<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2017\/10\/12\/sicherheit-outlook-patzt-malware-trotz-office-makrosperre-ausfhrbar\/\">Sicherheit: Outlook patzt, Malware trotz Office Makrosperre ausf\u00fchrbar<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2020\/05\/09\/office-updates-mit-vba-problemlsung-6-8-mai-2020\/\">Office-Updates mit VBA-Probleml\u00f6sung (6.\/8. Mai 2020)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/12\/31\/der-8-jahre-alte-bug-in-64-bit-vba\/\">Der 8 Jahre alte Bug in 64-Bit-VBA<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2019\/08\/17\/fix-fr-vb6-vba-vbscript-problem\/\">Fix f\u00fcr VB6, VBA, VBScript-Problem<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2019\/08\/22\/windows-7-8-1-aktualisierte-updates-mit-vb6-vba-fix-vom-21-8-2019\/\">Windows 7\/2008 R2: Aktualisierte Updates mit VB6\/VBA-Fix vom 21.8.2019<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2019\/08\/15\/august-2019-updates-rger-mit-vb6-vba-und-vbscript\/\">August 2019 Updates: \u00c4rger mit VB6, VBA und VBScript<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Macros in Office stellen ein Einfallstor f\u00fcr Malware wie Dridex, Emotet, Trickbot, Qbot etc. dar. Microsoft hatte Pl\u00e4ne, Makros in Office 365 standardm\u00e4\u00dfig zu deaktivieren. Nun scheint diese Idee wieder kassiert worden zu sein, Makros werden auch zuk\u00fcnftig nicht standardm\u00e4\u00dfig &hellip; <a href=\"https:\/\/borncity.com\/blog\/2022\/07\/08\/microsoft-will-standardmig-nun-doch-keine-makros-in-office-blockieren\/\">Weiterlesen <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[270,426],"tags":[8330,4322,4328,2659],"class_list":["post-270310","post","type-post","status-publish","format-standard","hentry","category-office","category-sicherheit","tag-macros","tag-office","tag-sicherheit","tag-vba"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/270310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=270310"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/270310\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=270310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=270310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=270310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}