Configure Microsoft Office Macros

Office Macro Security: Stop Malware at the Email Gateway

Introduction:

Macros are the trojan horses of modern attacks – seemingly harmless documents that deliver devastating payloads. The ASD recommends blocking all macros by default, as they’re involved in 42% of initial access breaches.

Maturity Level Implementation:

Level 0:

(Non-Compliant)

  • Macros enabled for all users
  • No logging or monitoring
  • Frequent malware infections

Level 1:

(Basic)

  • Macros disabled by default
  • Limited approved use cases
  • Basic logging enabled

Level 2

(Intermediate)

  • Digitally signed macros only
  • Publisher certificate requirements
  • Centralized telemetry collection

Level 3:

(Advanced)

  • Isolated macro execution environments
  • Behavior-based macro analysis
  • Integration with email security