Where to go to turn off -- security settings restrict access to the file because it is not digitally signed --

Posted on 2007-09-28
Last Modified: 2013-11-27
Now I though I was good at finding answers  - NOT --
I built an app in Access 2003, a rather stright forward simple program. Sent it out to several clients.
All was good untill one of my users did not have the correct version, did not check with me and installed on  Access 2002. Man, it hit the fan. He can not run his ol'relibable databases because he gets the error -- "security settings restrict access to the file because it is not digitally signed".
SO now it's my fault (I know you'all have been there!). I used the Microsoft Package wizzard to put the pony show together, so the clients registry was affectived I'm sure.
1. Why did my little tiny, plainly dressed , never had a date program mess up his macro security settings.
2. Where do I go to reset the Macro security settings in Access 2000 / 2002.
Boy, sometimes I feel we all should get together and boycott brother Bill  -- we atre his testing team. Say where's my check Bill.
Question by:fturner64119
    LVL 119

    Expert Comment

    by:Rey Obrero
    Tools > macro, select Low or medium
    LVL 119

    Expert Comment

    by:Rey Obrero
    Tools > macro >security

             select Low or medium
    LVL 2

    Expert Comment

    More than likely the version of Jet installed, maybe this will help.

    Developers  need to download the following service pack. This will change the version of Jet 4 that you are using with Access 2000, 2002, 2003.  Find out more and download from the following Microsoft Knowledge Base Article - 829558

    Otherwise head to
    Scan for updates
    Pick the operating system list. (It is a non essential download)
    Find Update for Jet 4.0 Service Pack 8 (KB829558) and click Add
    Click Review and Install updates
    Click Install Now

    When you have finished, the file c:\windows\system32\msjet40.dll should have a version property value of 4.0.8015.0

    ---------RESET MACRO SECURITY SETTINGS-----------

    On the Tools menu, click Customize, and then click the Commands tab.

    Click Rearrange Commands, select Menu Bar, and in the Menu Bar box, click Tools | Macro.

    In the Controls section, click Add.

    The Add command dialog box will appear.

    In the Categories box, click Tools, and then in the Commands box, click Security.
    The Security command will appear in the Controls box.

    Use the Move Up and Move Down buttons to position the Security command where you want.
    If you'd like to position the Security command in its own group (between horizontal lines), with Security selected, click Modify Selection and click Begin a Group. Select the menu item below the Security command, and repeat.

    Click Close twice.

    You may still get a security warning but clicking through should work just fine!

    Good luck

    - C
    LVL 75

    Accepted Solution

    LVL 84

    Assisted Solution

    by:Scott McDaniel (Microsoft Access MVP - EE MVE )
    See this link:

    And I would be VERY leery of advising your client to set the Macro security to Low, which basically disables that machines macro virus protection. If you do this, make SURE your client knows whats going on, otherwise you might just get an even nastier phone call if the computer picks up a virus (which still wouldn't be your fault, but you know how users are <g>).

    Updating Jet won't get rid of this security warning, as it's generated by Access. However, updating Jet is part of the solution.

    IMO, if you're going to produce Access projects professionally you should obtain and use a Digital Certificate. I know many don't agree with that, but IMO it's a necessary evil in today's world. I got mine from Comodo ( for about $150/year ...

    Also, there is simply no way that installing an Access project could affect other apps on the machine, unless your installation somehow changed Access settings. The PDW could, I suppose, do this but in general all the PDW does is  build folder, copy files, and build shortcuts. That said, if you plan on deploying apps to users I'd strongly encourage you to consider a different packaging solution. The PDW is lame, at best, and there are plenty of free installers out there (I used Inno Setup for some time before moving to Wise, and was very pleased with it). Check this link for installers:

    Can you list the files that were distributed with the PDW? In many cases the PDW will pickup files that aren't needed, and deploying those could cause some issues ...

    Your client should be able to simply uninstall your application; if I'm not mistaken, the PDW provides uninstall capabilites (i.e. adds the app to the Add/Remove Programs list).
    LVL 119

    Expert Comment

    by:Rey Obrero
    another thing you need to consider here are the References.

    Microsoft DAO 3.6 object library is by default included in A2003 references but not in A2002

    if you are using DAO in your codes, you will encounter errors running the application in A2002
    LVL 84
    RE: DAO ... that is true, but it's not the cause of the security warnings, which are generated before the project is opened ...
    LVL 75

    Expert Comment

    by:DatabaseMX (Joe Anderson - Access MVP)
    "you should obtain and use a Digital Certificate"

    Scott, I'm not disagreeing with what you are saying, but ... as far as I'm concerned this entire DC scheme is borderline scam for a handful of companies to collect a reocurring fee every year.  It's unfortunate that the Macro InSecurity is not controllable per Application (Word, Access, Excel) etc.  Then, you could turn it off for Access only.


    Author Comment

    As Willie Mays used to say "SAY HEY" ya'all
    That was some really go stuff. It's just a damn shame that a person has to go to such extrems to find out what brother billy screwed up! The kind folks at MS must chuckle all the way to the bank. CMSnetTeck gave it a good try, but I have Access 2000 and 2003 and not 2002 which likely has the tools setup as he described, but I don't. Brother billy decided a long time ago that all he has to do is scramble a few menus up and he can call it a new version.
    If I spent all the dollars that everyone trys to suck out of me (ie DC's) and so forth, I would be broke. I am a very small time player. He already got $800 dollars for a "Tools for Office just so I could have a runtime, and, it breaks about the time. Jezz, what a rant, sorry.
    CMSnetTeck was good, but LMSConsulting and DatabaseMX hit it on the head.
    Thanks, seems I found folks that know there sh**.

    LVL 84
    <as far as I'm concerned this entire DC scheme is borderline scam for a handful of companies to collect a reocurring fee every year.>

    I'd tend to agree with you and would like to see a more robust security scheme for Office components. I don't think that's gonna happen, though, and for the time being we'll have to live with those parameters I suppose.

    fturner: I realize you don't want to spend any more bucks, but that's just life in the programming world. It's just like buying tools for work - a carpenter wouldn't go to work without a toolbox full of tools, and a programmer is the same way. In many cases, the carpenter can get by without all the newest and latest tools - as can the programmer - but in some cases it makes their work easier or improves their skills and reputation. That's the way I view digital certs - a necesary evil that does improve my reputation with the people that matter most: my clients. In my world, I can't deliver files unless they are digitally signed.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    The first two articles in this short series — Using a Criteria Form to Filter Records ( and Building a Custom Filter ( — discuss in some detail how a form can be…
    Overview: This article:       (a) explains one principle method to cross-reference invoice items in Quickbooks®       (b) explores the reasons one might need to cross-reference invoice items       (c) provides a sample process for creating a M…
    In Microsoft Access, learn how to use Dlookup and other domain aggregate functions and one method of specifying a string value within a string. Specify the first argument, which is the expression to be returned: Specify the second argument, which …
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    12 Experts available now in Live!

    Get 1:1 Help Now