{"id":20854,"date":"2022-02-09T17:59:54","date_gmt":"2022-02-09T17:59:54","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=20854"},"modified":"2022-02-09T17:59:54","modified_gmt":"2022-02-09T17:59:54","slug":"microsoft-blocks-vba-macros-msix-protocol","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/","title":{"rendered":"Microsoft Blocks VBA Macros by Default, Temporarily Shuts Down MSIX Protocol"},"content":{"rendered":"<p>Microsoft is shutting a couple of security holes, including one that has been a favored target of attackers for years and another that the enterprise software giant recently learned could be exploited to install a malicious package.<\/p>\n<p>At the same time, the federal government is now adding another Microsoft flaw to its <a href=\"https:\/\/www.esecurityplanet.com\/threats\/mitre-cisa-hardware-software-vulnerabilities\/\">list of known vulnerabilities<\/a>, giving federal agencies until Feb. 18 to patch a bug in all unpatched versions of Windows 10 and urging private and commercial organizations to remediate all flaws listed in its <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">Known Exploited Vulnerabilities Catalog<\/a>.<\/p>\n<p>In its <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2022\/02\/04\/cisa-adds-one-known-exploited-vulnerability-catalog\">alert<\/a>, the Cybersecurity and Infrastructure Security Agency (CISA) said the decision to add the flaw \u2013 tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-21882\">CVE-2022-21882<\/a> \u2013 was \u201cbased on evidence that threat actors are actively exploiting the vulnerabilities listed in the table below. These types of vulnerabilities are a frequent attack vector for malicious cyber actors of all types and pose significant risk to the federal enterprise.\u201d<\/p>\n<p>\u201cIt appears CISA added this as due diligence, rather than because the attack is a high threat,\u201d Mike Parkin, an engineer at cybersecurity vendor Vulcan Cyber, told <em>eSecurity Planet<\/em>. \u201cMicrosoft&#8217;s explanation indicates that the attack requires local access and is of high complexity, both of which reduce the likelihood of it being widely used in the wild.\u00a0Patches are available and they should be deployed as part of any organization&#8217;s standard maintenance procedure.\u201d<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">Best Patch Management Software<\/a><\/p>\n<h2><strong>Disabling VBA Macros<\/strong><\/h2>\n<p>One of the moves Microsoft officials announced this week is the plan to block Visual Basic for Applications (VBA) macros by default in a range of Office applications. The change is directed at VBA macros obtained from the internet. Users will no longer be able to enable certain content by a simple click of a button. If they try, a message bar will appear directing them to learn more about the situation.<\/p>\n<p>\u201cThe default is more secure and is expected to keep more users safe including home users and information workers in managed organizations,\u201d Kellie Eickmeyer, a principal program manager at Microsoft, wrote in a <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-365-blog\/helping-users-stay-safe-blocking-internet-macros-by-default-in\/ba-p\/3071805\">blog post<\/a>. \u201cFor years Microsoft Office has shipped powerful automation capabilities called active content, the most common kind are macros. While we provided a notification bar to warn users about these macros, users could still decide to enable the macros by clicking a button.\u201d<\/p>\n<p>Threat actors can send macros in Office files to users who could easily enable them, causing malicious payloads to be delivered.<\/p>\n<p>\u201cThe impact can be severe including <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a>, compromised identity, data loss, and remote access,\u201d Eickmeyer wrote.<\/p>\n<p>The change is part of a recent pattern by Microsoft, which has begun taking security into its own hands, as users can be slow to install critical patches (see <a href=\"https:\/\/www.esecurityplanet.com\/applications\/microsoft-makes-exchange-server-patches-less-optional\/\">Microsoft Makes Exchange Server Patches Less Optional<\/a>).<\/p>\n<h2><strong>Security By Default<\/strong><\/h2>\n<p>The change will begin rolling out in Version 2203, starting with the preview of Current Channel in early April and later in other update channels, such as Current Channel, Monthly Enterprise Channel and Semi-Annual Enterprise Channel. It will impact Office on devices that are running Windows and affects Access, Excel, PowerPoint, Word and Visio.<\/p>\n<p>Security professionals applauded Microsoft\u2019s decision.<\/p>\n<p>\u201cOne of the important but underappreciated aspects of cybersecurity is that defaults matter \u2013 and sometimes matter a lot,\u201d Oliver Tavakoli, CTO at cybersecurity firm Vectra, told <em>eSecurity Planet<\/em>. \u201cSeemingly 50-50 decisions made by product managers at application and platform providers can expose their customers to extraordinary risk. As the example of VBA macros demonstrates, once such a choice has been made, it\u2019s a difficult and lengthy process to change the default to something more secure as the fear of breaking things creates a form of institutional paralysis.\u201d<\/p>\n<p>The equation is a simple one, Tavakoli said: \u201cLeave features which may have security implications off by default and let customers choose whether the benefit of the feature outweighs the security risk of having it on.\u201d<\/p>\n<h2><strong>Overdue Security Change<\/strong><\/h2>\n<p>Ray Kelly, a Fellow at NTT Application Security, told <em>eSecurity Planet<\/em> that \u201cVBA macros have been a target for hackers for over two decades, easy to code and run with the current users\u2019 permissions. Blocking macros by default is a good move at the cost of inconvenience and can potentially protect a user from <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> or data loss.\u201d<\/p>\n<p>Jon Gaines, senior application security consultant at nVisium, noted that for red teams at many organizations, macros have been a useful tool in security training. He also dinged Microsoft for taking too long to disable VBA macros.<\/p>\n<p>\u201cMacros have been a threat to Office users for many years,\u201d Gaines told <em>eSecurity Planet<\/em>. \u201cGood on [Microsoft] for finally implementing this, but I don&#8217;t think it gets end users out of danger completely. It&#8217;s important to note that this only affects Office files downloaded from the internet, which have already had a\u00a0warning if it contains a macro at this time. However, making it more than one click to execute the macros is a great step.\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-20856\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/02\/Microsoft-VBA-macros-e1644429237161.png\" alt=\"VBA macro security\" width=\"900\" height=\"330\" \/><\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-secure-email-gateways\/\">Top Secure Email Gateway Solutions<\/a><\/p>\n<h2><strong>Temporary Shutdown for MSIX<\/strong><\/h2>\n<p>Late last week, Microsoft also announced it was temporarily turning off the MSIX ms-appinstaller protocol handler in its Windows AppX Installer after learning that a security flaw was being exploited by cybercriminals to deliver such malware as <a href=\"https:\/\/www.esecurityplanet.com\/threats\/email-still-a-major-attack-vector-security-research\/\">Emotet<\/a> (a Trojan spread via emails), TrickBot (a banking Trojan) and Bazaloader (which can result in stolen data or ransomware).<\/p>\n<p>In a <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/windows-it-pro-blog\/disabling-the-msix-ms-appinstaller-protocol-handler\/ba-p\/3119479\">blog post<\/a>, Dian Hartono, a program manager at Microsoft, wrote that the vendor learned an attacker could spoof App Installer to install a package that a user didn\u2019t want to install. The vulnerability is being tracked as <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-43890\">CVE-2021-43890<\/a>.<\/p>\n<p>\u201cWe are actively working to address this vulnerability,\u201d Hartono wrote. \u201cFor now, we have disabled the ms-appinstaller scheme (protocol). This means that App Installer will not be able to install an app directly from a web server. Instead, users will need to first download the app to their device, and then install the package with App Installer. This may increase the download size for some packages.\u201d<\/p>\n<p>With the MSIX app package, some legacy Windows applications can get \u201cmodern packaging and deployment features,\u201d giving enterprises a way to ensure their applications are up-to-date and ensure an easy installation process.<\/p>\n<p>\u201cThe ms-appinstaller protocol handler was introduced to enable users to seamlessly install an application by simply clicking a link on a website,\u201d Hartono wrote. \u201cWhat this protocol handler provides is a way for users to install an app without needing to download the entire MSIX package. This experience is popular, and we are thrilled that it has been adopted by so many people today.\u201d<\/p>\n<p>The protocol will be re-enabled after ensuring it is secure. Microsoft is considering bringing in a group policy that will enable IT administrators to re-enable the protocol and control its use inside their organizations.<\/p>\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f020e4f92-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f020e4f92\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f020e4f92\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f020e4f92\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f020e4f92\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f020e4f92\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f020e4f92\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft is shutting a couple of security holes, including one that has been a favored target of attackers for years and another that the enterprise software giant recently learned could be exploited to install a malicious package. At the same time, the federal government is now adding another Microsoft flaw to its list of known [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":20856,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[22],"tags":[],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[382,31780],"class_list":["post-20854","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applications","b2b_audience-awareness-and-consideration","b2b_product-application-security-vulnerability-management","b2b_product-patch-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft Blocks VBA Macros by Default, Temporarily Shuts Down MSIX Protocol | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"As users fail to patch, Microsoft has taken security into its own hands. The VBA macro and MSIX moves are the latest example.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Blocks VBA Macros by Default, Temporarily Shuts Down MSIX Protocol | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"As users fail to patch, Microsoft has taken security into its own hands. The VBA macro and MSIX moves are the latest example.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-09T17:59:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Microsoft-VBA-macros-e1644429237161.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"Microsoft Blocks VBA Macros by Default, Temporarily Shuts Down MSIX Protocol\",\"datePublished\":\"2022-02-09T17:59:54+00:00\",\"dateModified\":\"2022-02-09T17:59:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/\"},\"wordCount\":1142,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Microsoft-VBA-macros-e1644429237161.png\",\"articleSection\":[\"Applications\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/\",\"name\":\"Microsoft Blocks VBA Macros by Default, Temporarily Shuts Down MSIX Protocol | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Microsoft-VBA-macros-e1644429237161.png\",\"datePublished\":\"2022-02-09T17:59:54+00:00\",\"dateModified\":\"2022-02-09T17:59:54+00:00\",\"description\":\"As users fail to patch, Microsoft has taken security into its own hands. The VBA macro and MSIX moves are the latest example.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Microsoft-VBA-macros-e1644429237161.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Microsoft-VBA-macros-e1644429237161.png\",\"width\":900,\"height\":330,\"caption\":\"VBA macro security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Blocks VBA Macros by Default, Temporarily Shuts Down MSIX Protocol\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Blocks VBA Macros by Default, Temporarily Shuts Down MSIX Protocol | eSecurity Planet","description":"As users fail to patch, Microsoft has taken security into its own hands. The VBA macro and MSIX moves are the latest example.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Blocks VBA Macros by Default, Temporarily Shuts Down MSIX Protocol | eSecurity Planet","og_description":"As users fail to patch, Microsoft has taken security into its own hands. The VBA macro and MSIX moves are the latest example.","og_url":"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/","og_site_name":"eSecurity Planet","article_published_time":"2022-02-09T17:59:54+00:00","og_image":[{"width":900,"height":330,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Microsoft-VBA-macros-e1644429237161.png","type":"image\/png"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"Microsoft Blocks VBA Macros by Default, Temporarily Shuts Down MSIX Protocol","datePublished":"2022-02-09T17:59:54+00:00","dateModified":"2022-02-09T17:59:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/"},"wordCount":1142,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Microsoft-VBA-macros-e1644429237161.png","articleSection":["Applications"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/","url":"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/","name":"Microsoft Blocks VBA Macros by Default, Temporarily Shuts Down MSIX Protocol | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Microsoft-VBA-macros-e1644429237161.png","datePublished":"2022-02-09T17:59:54+00:00","dateModified":"2022-02-09T17:59:54+00:00","description":"As users fail to patch, Microsoft has taken security into its own hands. The VBA macro and MSIX moves are the latest example.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Microsoft-VBA-macros-e1644429237161.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/02\/Microsoft-VBA-macros-e1644429237161.png","width":900,"height":330,"caption":"VBA macro security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/applications\/microsoft-blocks-vba-macros-msix-protocol\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Microsoft Blocks VBA Macros by Default, Temporarily Shuts Down MSIX Protocol"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20854"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=20854"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20854\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/20856"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=20854"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=20854"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=20854"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=20854"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=20854"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=20854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}